Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/shiva108/waes
CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result
https://github.com/shiva108/waes
dirb dump-files gobuster htb http nikto nmap nse report scanner uniscan waes wafw00f whatweb xss-detection
Last synced: 2 months ago
JSON representation
CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result
- Host: GitHub
- URL: https://github.com/shiva108/waes
- Owner: Shiva108
- License: gpl-2.0
- Created: 2018-03-23T13:20:10.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2019-07-30T18:20:50.000Z (over 5 years ago)
- Last Synced: 2023-03-10T08:13:16.831Z (almost 2 years ago)
- Topics: dirb, dump-files, gobuster, htb, http, nikto, nmap, nse, report, scanner, uniscan, waes, wafw00f, whatweb, xss-detection
- Language: Shell
- Homepage:
- Size: 729 KB
- Stars: 59
- Watchers: 6
- Forks: 35
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
![GitHub Logo](banner.png)
## CPH:SEC WAES at a Glance
Doing HTB or other CTFs enumeration against targets with HTTP(S) can become trivial.
It can get tiresome to always run the same script/tests on every box eg. nmap, nikto, dirb and so on. A one-click on target with automatic reports coming solves the issue. Furthermore, with a script the enum process can be optimized while saving time for hacker. This is what **CPH:SEC WAES** or _Web Auto Enum & Scanner_ is created for. WAES runs 4 steps of scanning against target (see more below) to optimize the time spend scanning. While multi core or multi-threaded scanning could be implemented it will almost surely get boxes to hang and so is undesirable.
* From current version and forward WAES will include an install script (see blow) as project moves from alpha to beta phase.
* WAES could have been developed in python but good bash projects are need to learn bash.
* WAES is currently made for CTF boxes but is moving towards online uses (see todo section)## To install:
```
1. $> git clone https://github.com/Shiva108/WAES.git
2. $> cd WAES
2. $> sudo ./install.sh
```Make sure directories are set correctly in supergobuster.sh.
Should be automatic with Kali & Parrot Linux.
* Standard directories for lists : SecLists/Discovery/Web-Content & SecLists/Discovery/Web-Content/CMS
* Kali / Parrot directory list : /usr/share/wordlists/dirbuster/## To run WAES
Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result.##############################################################################
Web Auto Enum & Scanner
Auto enums website(s) and dumps files as result
##############################################################################
Usage: waes.sh -u {IP}
waes.sh -h-h shows this help
-u IP to test eg. 10.10.10.123
-p port nummer (default=80)Example: ./waes.sh -u 10.10.10.130 -p 8080
## Enumeration Process / Method
WAES runs ..
Step 0 - Passive scan - (disabled in the current version)
+ whatweb - aggressive mode
+ OSIRA (same author) - looks for subdomainsStep 1 - Fast scan
+ wafw00 - firewall detection
+ nmap with http-enumStep 2 - Scan - in-depth
+ nmap - with NSE scripts: http-date,http-title,http-server-header,http-headers,http-enum,http-devframework,http-dombased-xss,http-stored-xss,http-xssed,http-cookie-flags,http-errors,http-grep,http-traceroute
+ nmap with vulscan (CVSS 5.0+)
+ nikto - with evasion A and all CGI dirs
+ uniscan - all tests except stress test (qweds)Step 3 - Fuzzing
+ super gobuster
- gobuster with multiple lists
- dirb with multiple lists
+ xss scan (to come).. against target while dumping results files in report/ folder.
## To Do
+ Implement domain as input
+ Add XSS scan
+ Add SSL/TLS scanning
+ Add domain scans
+ Add golismero
+ Add dirble
+ Add progressbar
+ Add CMS detection
+ Add CMS specific scans