Ubuntu
apt-key update && apt-get update
apt-get install whois --force-yes
- 👍
WhatWeb X-XSS Protection Header Check:whatweb example.com -a 1
| X-XSS-Protection[1 - 👍
Nmap IIS WebDav:nmap -T4 -p80 --script=http-iis-webdav-vuln <host>
| WebDAV is ENABLED - 👍
Wapiti Checks:wapiti <host> -f txt -o temp_wapiti
| Host: - 👍
Nmap SMB UDP Check:nmap -p137,138 --open <host>
| /open - 👍
Nmap SMB TCP Check:nmap -p445,137-139 --open <host>
| /open tcp - 👍
ASP.Net Elmah AXD:wget -O temp_aspnet_elmah_axd /elmah.axd
| Microsoft SQL Server Error Log - 👍
Nmap SNMP Check:nmap -p161 -sU --open <host>
| 161/open udp - 👍
Nmap Full UDP Port Scan:nmap -p1-65535 -sU --open <host>
| /open - 👍
Nmap Full TCP Port Scan:nmap -p1-65535 --open <host>
| /open tcp - 👍
Nmap RDP TCP Check:nmap -p3389 --open -sT <host>
| 3389/open tcp - 👍
Nmap RDP UDP Check:nmap -p3389 --open -sU <host>
| 3389/open udp - 👍
Nmap ORACLE Check:nmap -p1521 --open <host>
| 1521/open tcp - 👍
Nmap MySQL Check:nmap -p3306 --open <host>
| 3306/open tcp - 👍
Nmap MS-SQL Server Check:nmap -p1433 --open <host>
| 1433/open tcp - 👍
Nmap TELNET Check:nmap -p23 --open <host>
| 23/open tcp - 👍
Nmap FTP Check:nmap -p21 --open <host>
| 21/open tcp - 👍
Nmap STUXNET Check:nmap --script stuxnet-detect -p 445 <host>
| 445/open tcp - 👍
Checks for WebDAV on home directory:davtest -url http://192.168.1.209
| SUCCEED - 👍
Golismero Webservers Fingerprint:golismero -e fingerprint_web scan example.com
| No vulnerabilities found. - 👍
Uniscan File Brute Forcer:uniscan -w -u example.com
| [+] - 👍
Uniscan Directory Brute Forcer:uniscan -q -u example.com
| [+] - 👍
Uniscan Mini Stress Tester:uniscan -r -u example.com
| [+] - 👍
Uniscan Checks for LFI, RFI and RCE:uniscan -s -u example.com
| [+] - 👍
Uniscan Checks for XSS, SQLi, BSQLi & a few checks:uniscan -d -u example.com
| [+] - 👍
Nikto XSS Expect Header Check:nikto -Plugins "apache_expect_xss" -host example.com
| 0 item(s) reported - 👍
Nikto Subdomain Bruter:nikto -Plugins "subdomain" -host example.com
| 0 item(s) reported - 👍
Nikto ShellShock Bug Check:nikto -Plugins "shellshock" -host example.com
| 0 item(s) reported - 👍
Nikto Internal IP Leak:nikto -Plugins "cookies" -host example.com
| 0 item(s) reported - 👍
Nikto HTTP PUT DEL Test:nikto -Plugins "put_del_test" -host example.com
| 0 item(s) reported - 👍
Nikto Headers Check:nikto -Plugins "headers" -host example.com
| 0 item(s) reported - 👍
Nikto MS10-070 Check:nikto -Plugins "ms10-070" -host example.com
| 0 item(s) reported - 👍
Nikto Server Issues:nikto -Plugins "msgs" -host example.com
| 0 item(s) reported - 👍
Nikto Server Outdated Checks:nikto -Plugins "outdated" -host example.com
| 0 item(s) reported - 👍
Nikto HTTP Options Checks:nikto -Plugins "httpoptions" -host example.com
| 0 item(s) reported - 👍
Nikto CGI Directories Enum:nikto -Plugins "cgi" -host example.com
| 0 item(s) reported - 👍
Nikto SSL Checks:nikto -Plugins "ssl" -host example.com
| 0 item(s) reported - 👍
Nikto File Checks:nikto -Plugins "sitefiles" -host example.com
| 0 item(s) reported - 👍
Nikto Injectable Paths:nikto -Plugins "paths" -host example.com
| 0 item(s) reported - 👍
Subdomains brute force with DNSMap:dnsmap example.com
| #1 - 👍
Check for open directories with Dirbuster:dirb http://example.com
- 👍
XSSer Checks:xsser --all=http://example.com
| Could not find any vulnerability! - 👍
Golismero SSL Scans:golismero -e sslscan scan example.com
| Occurrence ID - 👍
Golismero Zone Transfer:golismero -e zone_transfer scan example.com
| DNS zone transfer successful - 👍
Golismero Nikto Scan:golismero -e nikto scan example.com
| Nikto found 0 vulnerabilities - 👍
Bruteforcing DNS with Golismero(timeconsuming yellow):golismero scan example.com -e brute_dns
| Possible subdomain leak - 👍
Checking zone transfers with DNSenum:dnsenum google.com
| corrupt (not successful) - 👍
Subdomain BruteForcing with Fierce:fierce -dns example.com
| Found 1 entries (usually www.example.com) will be included, so have to skip it. - 👍
Check for emails with Dmitry:dmitry -e yahoo.com
| Found 0 E-Mail(s) - 👍
Check for subdomains with Dmitry:dmitry -s yahoo.com
| Found 0 possible subdomain(s) - 👍
Golismero Brute Force Directories:golismero -e brute_directories scan example.com
| No vulnerabilities found. - 👍
Golismero SQLMap:golismero -e sqlmap scan example.com
| No vulnerabilities found. - 👍
Golismero Brute URL Predictables:golismero -e brute_url_predictables scan example.com
| No vulnerabilities found. - 👍
Golismero HeartBleed Check:golismero -e heartbleed scan example.com
| No vulnerabilities found. - 👍
Checks if domain is spoofed/hijacked:golismero scan example.com -e dns_malware
| No vulnerabilities found. - 👍
SSL Compression Enabled:sslyze --compression target.com
| Compression disabled - 👍
Check for WordPress: Do a wget with wp-admin and grep the source (check for login/wp-login) curl -s http://somepage.com | grep whatever - 👍
Check for Illegal Characters on ASP.Net: /%7C.aspx~ - 👍
Check for Joomla: Do a wget with administrator and search for joomla - 👍
Check for Drupal: Do a wget with user and search for drupal - 👍
SSL FREAK Check:nmap --script ssl-enum-ciphers -p 443
| least strength: broken - 👍
SSL CCS Injection:nmap -p 443 --script ssl-ccs-injection
| check for Vulnerable - 👍
Slow-loris DoS Check:nmap -p80,443 --script http-slowloris --max-parallelism 500
| check for Vulnerable - 👍
Poodle Vulnerability Check:nmap -sV --version-light --script ssl-poodle -p 443
| check for Vulnerable - 👍
Heartbleed Check with NMap:nmap -p 443 --script ssl-heartbleed
| check for VULNERABLE
- if snmp found, do
braa
- research
dnsmap
log for internal ip leak. [+] 20 (sub)domains and 20 IP address(es) found [+] 4 internal IP address(es) disclosed [+] completion time: 1568 second(s) amap, xsser, golismero, sslyze, bed, doona, grabber, nikto -HELP,
- Unavailable Tools:
sublist3r, w3af, goofile, crowbar
blindElephant.py http://192.168.1.252/wp wordpress
aftermath checkdmitry -n example.com
not retrieving.dirbuster -u http://example.com -H
looks for a directory wordlist under the same directory.dnsenum --enum --noreverse example.com
google blocking your queries. (try somewhere else)thc-ssl-dos -l 100 192.168.1.208 443 --accept
gets only ips as input. write an alternative |dig +short example.com | grep -m 1 ""
doona -t example.com -k -m HTTP
| 23/37 [POST / HTTP/1.0XAXAX] .........................................Problem (3) occured with POST / HTTP/1.0XAXAX (965)
- 👍
Clear process traces and Ctrl+C hold crashes. - 👍
Implement Keyboard Interrupts and Instant Quit.