Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/a0xnirudh/WebXploiter
WebXploiter - An OWASP Top 10 Security scanner !
https://github.com/a0xnirudh/WebXploiter
Last synced: 3 months ago
JSON representation
WebXploiter - An OWASP Top 10 Security scanner !
- Host: GitHub
- URL: https://github.com/a0xnirudh/WebXploiter
- Owner: a0xnirudh
- License: gpl-3.0
- Created: 2015-07-30T06:05:42.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2016-02-29T08:51:00.000Z (almost 9 years ago)
- Last Synced: 2024-08-01T16:33:36.826Z (6 months ago)
- Language: HTML
- Homepage: http://webxploiter.readthedocs.org/
- Size: 2.37 MB
- Stars: 70
- Watchers: 9
- Forks: 20
- Open Issues: 7
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-termux-hacking - WebXploiter - WebXploiter - An OWASP Top 10 Security scanner !.[![->](https://img.shields.io/github/stars/a0xnirudh/WebXploiter.svg?style=social&label=Star&maxAge=2592000)](https://github.com/a0xnirudh/WebXploiter/stargazers/) (Uncategorized / Uncategorized)
README
WebXploiter V0.1
================
This is a basic version of WebXploiter. As of now, it will do a basic Recon and print the results back.Install:
-------
Just run `python install.py` from install directory. Rest is taken care of :)Usage:
------
```
usage: WebXploiter.py [-h] [-u U] [-a] [-A1] [-A3]Do a basic Recon for Web challenges
optional arguments:
-h, --help show this help message and exit
-u U, -url U Target URL to Recon
-a, -all Try all possible attacks
-A1 Test for only Injection Attacks
-A3 Test for only XSS Attacks````
Sample Output:
--------------
A sample output against localhost:```
python WebXploiter.py -u "http://localhost/challs/action.php" -am m # m m ""# " m
# # # mmm #mmm # # mmmm # mmm mmm mm#mm
" #"# # #" # #" "# ## #" "# # #" "# # #
## ##" #"""" # # m""m # # # # # # # """
# # "#mm" ##m#" m" "m ##m#" "mm "#m#" mm#mm "mm
#
"mmmmm
# "# mmm mmm mmm m mm
#mmmm" #" # #" " #" "# #" #
# "m #"""" # # # # #
# " "#mm" "#mm" "#m#" # #===============================================================
Response Headers:x-powered-by : PHP/5.5.9-1ubuntu4.11
set-cookie : lol=bG9sCg%3D%3D, PHPSESID=44705989020
keep-alive : timeout=5, max=100
server : Apache/2.4.7 (Ubuntu)
connection : Keep-Alive
date : Fri, 07 Aug 2015 18:13:27 GMT
content-type : text/html
===============================================================
Robots.txt Analysis:test
===============================================================
Cookies:PHPSESID : 20639818163
lol : bG9sCg%3D%3DBase64 Encoded Cookies: (Attention!)
lol : lol=======================================================
Possible Attack:POC: lol: bG9sCg%3D%3D'
Error Based SQL Injection (Cookie Based)
Refer: https://www.exploit-db.com/docs/33253.pdf=======================================================
Possible Attack:Error Based SQL Injection (User-Agent)
POC: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:39.0) Gecko/20100101 Firefox/39.0'Refer: http://resources.infosecinstitute.com/sql-injection-http-headers/
```Vulnerability Analysis:
-----------------------
1. Reconnaissance:
* HTTP Header checks
* HTTP enabled methods check (Cross Site Tracing)
* Cookie checks (decodes base64 automatically)2. Information Disclosure:
* Robots.txt Analysis
* .htaccess public access check
* .svn/entries public access check
* Microsoft IIS, internal IP disclosure check3. Injection Attacks:
* Error based SQL injection:
* Cookie based
* User-Agent based* CRLF injection:
* CRLF tests on main URLs* Host header injection:
* Modifying `Host` header
* Adding `X-Forwarded-Host` additional header4. Clickjacking:
* `X-FRAME-OPTIONS` header check
* Frame busting checksContribute:
-----------If you have any feature requests or came across any bugs, do add a new [issue](https://github.com/a0xnirudh/WebXploiter/issues) or give a pull request ;)