Difference between revisions of "Kali Linux: Scan Vulnerability menggunakan Grabber"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
Onnowpurbo (talk | contribs)  | 
				Onnowpurbo (talk | contribs)   | 
				||
| Line 43: | Line 43: | ||
  grabber --spider 2 --sql --xss --bsql --url http://192.168.0.100/DVWA-1.9/  |   grabber --spider 2 --sql --xss --bsql --url http://192.168.0.100/DVWA-1.9/  | ||
| − |   Start scanning... http://192.168.1.  | + |   Start scanning... http://192.168.0.100/DVWA-1.9/  | 
| − |   runSpiderScan @  http://192.168.1.  | + |  runSpiderScan @  http://192.168.0.100/DVWA-1.9/  |   # 2  | 
| + |   runSpiderScan @  http://192.168.0.100/DVWA-1.9/  |   # 1  | ||
| + |  runSpiderScan @  http://192.168.0.100/DVWA-1.9/  |   # 0  | ||
  Start investigation...  |   Start investigation...  | ||
| − |   Method = GET  http://192.168.1.  | + |   Method = GET  http://192.168.0.100/DVWA-1.9/  | 
| − |   [Cookie]   | + |   [Cookie]	0 	:	<Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/>  | 
| − |   [Cookie]   | + |   [Cookie]	1 	:	<Cookie security=impossible for 192.168.0.100/DVWA-1.9>  | 
| − |   Method = GET  http://192.168.  | + |   Method = GET  http://192.168.0.100/DVWA-1.9/  | 
| − | |||
| − | |||
| − | |||
| − | |||
==Referensi==  | ==Referensi==  | ||
* http://tools.kali.org/web-applications/grabber  | * http://tools.kali.org/web-applications/grabber  | ||
Revision as of 05:34, 4 April 2017
Sumber: http://tools.kali.org/web-applications/grabber
Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website. Grabber is simple, not fast but portable and really adaptable. This software is designed to scan small websites such as personals, forums etc. absolutely not big application: it would take too long time and flood your network.
Fitur:
- Cross-Site Scripting
 - SQL Injection (there is also a special Blind SQL Injection module)
 - File Inclusion
 - Backup files check
 - Simple AJAX check (parse every JavaScript and get the URL and try to get the parameters)
 - Hybrid analysis/Crystal ball testing for PHP application using PHP-SAT
 - JavaScript source code analyzer: Evaluation of the quality/correctness of the JavaScript with JavaScript Lint
 - Generation of a file [session_id, time(t)] for next stats analysis.
 
Perintah Grabber
grabber -h
Usage: grabber.py [options]
Options:
  -h, --help            show this help message and exit
  -u ARCHIVES_URL, --url=ARCHIVES_URL
                        Adress to investigate
  -s, --sql             Look for the SQL Injection
  -x, --xss             Perform XSS attacks
  -b, --bsql            Look for blind SQL Injection
  -z, --backup          Look for backup files
  -d SPIDER, --spider=SPIDER
                        Look for every files
  -i, --include         Perform File Insertion attacks
  -j, --javascript      Test the javascript code ?
  -c, --crystal         Simple crystal ball test.
  -e, --session         Session evaluations
grabber Usage Example
Spider web application untuk ke dalaman 2 (–spider 2), cek SQLi (--sql), XSS (--xss), blind SQLi (--bsql) attack untuk URL (--url http://192.168.0.100/DVWA-1.9/):
grabber --spider 2 --sql --xss --bsql --url http://192.168.0.100/DVWA-1.9/
Start scanning... http://192.168.0.100/DVWA-1.9/ runSpiderScan @ http://192.168.0.100/DVWA-1.9/ | # 2 runSpiderScan @ http://192.168.0.100/DVWA-1.9/ | # 1 runSpiderScan @ http://192.168.0.100/DVWA-1.9/ | # 0 Start investigation... Method = GET http://192.168.0.100/DVWA-1.9/ [Cookie] 0 : <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/> [Cookie] 1 : <Cookie security=impossible for 192.168.0.100/DVWA-1.9> Method = GET http://192.168.0.100/DVWA-1.9/