Scanning and Recon: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
mNo edit summary
Line 10: Line 10:
* https://github.com/six2dez/reconftw. [https://gist.github.com/jhaddix/141d9cb07ca0590dbc43389e0e4af98f Free scan config (no API)]
* https://github.com/six2dez/reconftw. [https://gist.github.com/jhaddix/141d9cb07ca0590dbc43389e0e4af98f Free scan config (no API)]
* https://github.com/lanmaster53/recon-ng
* https://github.com/lanmaster53/recon-ng
* https://github.com/Dionach/CMSmap
* https://github.com/edoardottt/cariddi
* https://github.com/jaeles-project/jaeles
* https://github.com/jaeles-project/jaeles
* https://github.com/1N3/Sn1per
* https://github.com/1N3/Sn1per
* https://github.com/projectdiscovery/nuclei
* https://github.com/projectdiscovery/nuclei
* https://github.com/wpscanteam/wpscan [Free and paid]
* https://github.com/wpscanteam/wpscan [Free and paid]
* https://github.com/OWASP/joomscan  
* https://github.com/OWASP/joomscan
* https://github.com/fgeek/pyfiscan
* https://github.com/immunIT/drupwn
* https://github.com/immunIT/drupwn
* https://github.com/rapid7/metasploit-framework
* https://github.com/Tuhinshubhra/RED_HAWK
* https://github.com/Tuhinshubhra/RED_HAWK
* https://github.com/root-tanishq/userefuzz
* https://github.com/root-tanishq/userefuzz
Line 28: Line 32:
* https://github.com/osmedeus/osmedeus-base [Free and Paid]
* https://github.com/osmedeus/osmedeus-base [Free and Paid]
* https://github.com/v3n0m-Scanner/V3n0M-Scanner
* https://github.com/v3n0m-Scanner/V3n0M-Scanner
* https://github.com/sqlmapproject/sqlmap
* https://github.com/r0oth3x49/ghauri


=== Port scanners ===
=== Port scanners ===
Line 54: Line 56:
* https://github.com/Proviesec/google-dorks
* https://github.com/Proviesec/google-dorks
* https://www.exploit-db.com/google-hacking-database
* https://www.exploit-db.com/google-hacking-database
== Exploitation ==
=== Public exploits ===
* https://www.kali.org/tools/exploitdb/#searchsploit
=== SQL injection (SQLi) ===
* https://github.com/sqlmapproject/sqlmap
* https://github.com/r0oth3x49/ghauri
=== Cross-site scripting (XSS) ===
* https://github.com/s0md3v/XSStrike
=== Command Injection ===
* https://github.com/commixproject/commix

Revision as of 09:32, 5 April 2023

These tools will scan web applications for vulnerabilities and misconfigurations, remember that they will cause a lot of traffic making lots of requests.

NOTE: This is not an exhaustive list.

Vulnerability scanners

To quickly cover a lot ground it's a good idea to scan your target using vulnerability scanners as they might be able to discover a vulnerability or misconfiguration that you can't find. To avoid WAFs make sure to use a list of random user-agent strings and a residential proxy list if possible and maybe encode some payloads.

Port scanners

When performing a port scan pay special attention to non-standard ports.

Technology scanners

NOTE: using browser add-ons will change your browser fingerprint and reduce anonymity.

When performing a penetration test we will want to know what technology is running on the target and what version it's running as so that later we can start looking for possible working public exploits.

Google Hacking

Exploitation

Public exploits

SQL injection (SQLi)

Cross-site scripting (XSS)

Command Injection