Kali Linux: Scan Vulnerability menggunakan Grabber: Difference between revisions

From OnnoCenterWiki
Jump to navigationJump to search
Onnowpurbo (talk | contribs)
No edit summary
Onnowpurbo (talk | contribs)
No edit summary
Line 4: Line 4:
Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website. Grabber is simple, not fast but portable and really adaptable. This software is designed to scan small websites such as personals, forums etc. absolutely not big application: it would take too long time and flood your network.
Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website. Grabber is simple, not fast but portable and really adaptable. This software is designed to scan small websites such as personals, forums etc. absolutely not big application: it would take too long time and flood your network.


Features:
Fitur:


    Cross-Site Scripting
* Cross-Site Scripting
    SQL Injection (there is also a special Blind SQL Injection module)
* SQL Injection (there is also a special Blind SQL Injection module)
    File Inclusion
* File Inclusion
    Backup files check
* Backup files check
    Simple AJAX check (parse every JavaScript and get the URL and try to get the parameters)
* Simple AJAX check (parse every JavaScript and get the URL and try to get the parameters)
    Hybrid analysis/Crystal ball testing for PHP application using PHP-SAT
* Hybrid analysis/Crystal ball testing for PHP application using PHP-SAT
    JavaScript source code analyzer: Evaluation of the quality/correctness of the JavaScript with JavaScript Lint
* JavaScript source code analyzer: Evaluation of the quality/correctness of the JavaScript with JavaScript Lint
    Generation of a file [session_id, time(t)] for next stats analysis.
* Generation of a file [session_id, time(t)] for next stats analysis.


Source: http://rgaucher.info/beta/grabber/
==Perintah Grabber==
Grabber Homepage | Kali Grabber Repo


    Author: Romain Gaucher
grabber -h
    License: BSD


Tools included in the grabber package
Usage: grabber.py [options]
grabber – Web application vulnerability scanner
root@kali:~# grabber -h
Options:
Usage: grabber [options]
  -h, --help            show this help message and exit
  -u ARCHIVES_URL, --url=ARCHIVES_URL
                        Adress to investigate
  -s, --sql            Look for the SQL Injection
  -x, --xss            Perform XSS attacks
  -b, --bsql            Look for blind SQL Injection
  -z, --backup          Look for backup files
  -d SPIDER, --spider=SPIDER
                        Look for every files
  -i, --include        Perform File Insertion attacks
  -j, --javascript      Test the javascript code ?
  -c, --crystal        Simple crystal ball test.
  -e, --session        Session evaluations


Options:
  -h, --help            show this help message and exit
  -u ARCHIVES_URL, --url=ARCHIVES_URL
                        Adress to investigate
  -s, --sql            Look for the SQL Injection
  -x, --xss            Perform XSS attacks
  -b, --bsql            Look for blind SQL Injection
  -z, --backup          Look for backup files
  -d SPIDER, --spider=SPIDER
                        Look for every files
  -i, --include        Perform File Insertion attacks
  -j, --javascript      Test the javascript code ?
  -c, --crystal        Simple crystal ball test.
  -e, --session        Session evaluations


==grabber Usage Example==
==grabber Usage Example==


Spider the web application to a depth of 1 (–spider 1) and attempt SQL (–sql) and XSS (–xss) attacks at the given URL (–url http://192.168.1.224):
Spider web application untuk ke dalaman 2 (–spider 2), cek SQLi (--sql), XSS (--xss), blind SQLi (--bsql) attack untuk URL (--url http://192.168.0.100/DVWA-1.9/):


  root@kali:~# grabber --spider 1 --sql --xss --url http://192.168.1.224
  grabber --spider 2 --sql --xss --bsql --url http://192.168.0.100/DVWA-1.9/


  Start scanning... http://192.168.1.224
  Start scanning... http://192.168.1.224

Revision as of 22:32, 3 April 2017

Sumber: http://tools.kali.org/web-applications/grabber


Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website. Grabber is simple, not fast but portable and really adaptable. This software is designed to scan small websites such as personals, forums etc. absolutely not big application: it would take too long time and flood your network.

Fitur:

  • Cross-Site Scripting
  • SQL Injection (there is also a special Blind SQL Injection module)
  • File Inclusion
  • Backup files check
  • Simple AJAX check (parse every JavaScript and get the URL and try to get the parameters)
  • Hybrid analysis/Crystal ball testing for PHP application using PHP-SAT
  • JavaScript source code analyzer: Evaluation of the quality/correctness of the JavaScript with JavaScript Lint
  • Generation of a file [session_id, time(t)] for next stats analysis.

Perintah Grabber

grabber -h
Usage: grabber.py [options]

Options:
  -h, --help            show this help message and exit
  -u ARCHIVES_URL, --url=ARCHIVES_URL
                        Adress to investigate
  -s, --sql             Look for the SQL Injection
  -x, --xss             Perform XSS attacks
  -b, --bsql            Look for blind SQL Injection
  -z, --backup          Look for backup files
  -d SPIDER, --spider=SPIDER
                        Look for every files
  -i, --include         Perform File Insertion attacks
  -j, --javascript      Test the javascript code ?
  -c, --crystal         Simple crystal ball test.
  -e, --session         Session evaluations


grabber Usage Example

Spider web application untuk ke dalaman 2 (–spider 2), cek SQLi (--sql), XSS (--xss), blind SQLi (--bsql) attack untuk URL (--url http://192.168.0.100/DVWA-1.9/):

grabber --spider 2 --sql --xss --bsql --url http://192.168.0.100/DVWA-1.9/
Start scanning... http://192.168.1.224
runSpiderScan @  http://192.168.1.224  |   # 1
Start investigation...
Method = GET  http://192.168.1.224
[Cookie]    0   :   <Cookie PHPSESSID=2742cljd8u6aclfktf1sh284u7 for 192.168.1.224/>
[Cookie]    1   :   <Cookie security=high for 192.168.1.224/>
Method = GET  http://192.168.1.224
[Cookie]    0   :   <Cookie PHPSESSID=2742cljd8u6aclfktf1sh284u7 for 192.168.1.224/>
[Cookie]    1   :   <Cookie security=high for 192.168.1.224/>


Referensi