HSC

Monday, October 15, 2018

WAScan - Web Application Scanner - Hunter Security Crew

WAScan - Web Application Scanner
 Features : 
FingerSprint
  • Content Management System (CMS) -> 6
  • Web Frameworks -> 22
  • Cookies/Headers Security
  • Languages -> 9
  • Operating Systems (OS) -> 7
  • Server -> ALL
  • Web App Firewall (WAF) -> 50+
  • Attacks : 
    • Bash Commands Injection
    • Blind SQL Injection
    • Buffer Overflow
    • Carriage Return Line Feed
    • SQL Injection in Headers
    • XSS in Headers
    • HTML Injection
    • LDAP Injection
    • Local File Inclusion
    • OS Commanding
    • PHP Code Injection
    • SQL Injection
    • Server Side Injection
    • XPath Injection
    • Cross Site Scripting
    • XML External Entity
    Audit : 
    • Apache Status Page
    • Open Redirect
    • PHPInfo
    • Robots.txt
    • XST
    BruteForce:
    • Admin Panel
    • Common Backdoor
    • Common Backup Dir
    • Common Backup File
    • Common Dir
    • Common File
    • Hidden Parameters
    Disclosure:
    • Credit Cards
    • Emails
    • Private IP
    • Errors -> (fatal errors,...)
    • SSN
    Installation Windows : 
    • Download File https://bit.ly/2QRQQVg
    • Extract Your Directory Windows C: D: 
    • Run CMD With Python 
    • Download Python 2.7 Here
    • Happy Exploiting :D
    Installation linux:
    • $ git clone Click Here wascan
    • $ cd wascan 
    • $ pip install BeautifulSoup
    • $ python wascan.py
    usage:
    FingerPrint:
    • $ python wascan.py --url http://xxxxx.com/ --scan 0
    Attacks;
    • $ python wascan.py --url http://xxxxx.com/index.php?id=1 --scan 1
    Audit:

    • $ python wascan.py --url http://xxxxx.com/ --scan 2

    No comments:

    Post a Comment