Posts

Showing posts from October, 2022

Pentest Tool - ParamSpider | Shahul Hameed

Image
                                                          ParamSpider Tool ParamSpider  is a Python language-based tool, an open-source tool used to dig parameters from web archives without interacting with the victim host. For digging parameters, the ParamSpider tool uses various techniques and wordlists . However, these parameters are most useful for security researchers or bug bounty hunters because they can easily test several bugs such as XSS, SQL injection, SSRF, or open redirect . Key Features of ParamSpider Tool 1.    ParamSpider Diggs hidden parameters from web archives of the entered target host. 2.    ParamSpider also finds parameters from target subdomains. 3.    ParamSpider gives support to URLs with specific extensions . 4.    ParamSpider mines the parameters from web archives without interacting with the victim host. 5.    ParamSpider saves the output of the scan in a nice and clean manner in text files. Installation: Note: Use python 3.7+ $ git c

Pentest - Web Application Vulnerability Scanner | Shahul Hameed

Image
 W eb Application Vulnerability Scanner  Tool Name:  NUCLEI   Description      Nuclei are used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offer to scan for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless, etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.           Nuclei are a fast, template-based vulnerability scanner focusing on extensive configurability , massive extensibility, and ease of use. Installation & Demonstration Usage:      CMD : nuclei -h Step 1:      Download and install before use nuclei Go lang in kali linux      CMD : sudo apt-get update & sudo apt-get upgrade      CMD: sudo apt-get install -y golang Step 2:      Download and install nuclei      sudo apt install nuclei Step 3:        nuclei --target <URL> Step 4: Scan sample results Recon Information