π οΈNikto, SQLMap, XSSer & Hydra Overview
Nikto
Nikto is a powerful web server vulnerability scanner used to identify security issues on websites. Here are several ways to use Nikto effectively:
Basic Web Server Scan:
Perform a basic scan on a website:
nikto -h https://www.example.comScan Specific Port:
Scan a specific port on the target:
nikto -h https://www.example.com -p 8080Scan Multiple Hosts:
Scan multiple hosts:
nikto -h https://www.example1.com https://www.example2.comSave Output to File:
Save scan results to a file (
output.txt):nikto -h https://www.example.com -o output.txtFull Scan with Manual Tuning:
Perform a comprehensive scan with manual tuning options:
nikto -h https://www.example.com -maxtime 3600 -Plugins -Tuning 8SSL Certificate Check:
Check SSL certificate details:
nikto -h https://www.example.com -sslScan with Authentication:
Perform a scan with authentication credentials (
admin:password):nikto -h https://www.example.com -id admin:passwordSuppress Output:
Suppress all output (useful for scripting):
nikto -h https://www.example.com -o /dev/nullScan Specific Paths:
Scan specific paths (
/app,/secure) on the target:nikto -h https://www.example.com -C all -Tuning 2 -p 443 -root /app,/secureDisable Certain Checks:
Disable specific checks (e.g., XSS):
nikto -h https://www.example.com -C all,-XSS
SQLMap
SQLMap is a powerful command-line tool used for detecting and exploiting SQL injection vulnerabilities in web applications. Here are several examples of how to use SQLMap effectively:
Basic Scan for SQL Injection:
Perform a basic scan to detect SQL injection vulnerabilities:
Detecting SQL Injection and Getting Database Information:
Detect SQL injection and retrieve database information:
Enumerating Tables in a Database:
Enumerate tables in a specific database (
dbname):Dumping Data from a Specific Table:
Dump data from a specific table (
users):Exploiting Time-Based Blind SQL Injection:
Exploit time-based blind SQL injection technique with a specified time delay (
5seconds):Using Custom Injection Payload:
Use a custom injection payload (
1' OR '1'='1) with data parameter (param=value):Dumping All Databases:
Dump all databases on the target server:
Brute Forcing Table Columns:
Brute force table columns in a specific database and table (
dbname.users):Exploiting Union-Based SQL Injection:
Exploit union-based SQL injection technique:
Using a Configuration File:
Use SQLMap with a configuration file (
sqlmapconfig.conf):
XSSer
XSSer is a command-line tool designed for detecting and exploiting Cross-Site Scripting (XSS) vulnerabilities in web applications. Here are several examples of how to use XSSer effectively:
Basic Scan for Stored XSS:
Perform a basic scan for stored XSS vulnerabilities on a specific URL parameter (
comment):DOM-based XSS Scan:
Conduct a scan specifically for DOM-based XSS vulnerabilities:
Scanning Multiple URLs:
Scan multiple URLs listed in a file (
urls.txt):Cookie-based XSS Exploitation:
Exploit XSS using a specific cookie (
auth=12345):Reflected XSS Detection:
Detect reflected XSS vulnerabilities with a custom payload in a query parameter:
Blind XSS Scan with Custom Payload:
Perform a blind XSS scan with a custom payload (
<script>alert(1)</script>) injected into a parameter (name):Exfiltrating Cookies via XSS:
Exfiltrate cookies (
auth=12345) via XSS exploitation:Brute Forcing Payloads:
Brute force payloads to discover XSS vulnerabilities:
Custom User-Agent Header:
Send requests with a custom User-Agent header (
MyCustomUserAgent):XSS Filter Bypass Attempt:
Attempt to bypass XSS filters on the target:
Hydar Tool
Hydra is a versatile command-line tool for performing brute force attacks against various protocols and services. Here are several examples of how to use Hydra effectively:
HTTP/HTTPS Authentication
Brute Force Attack on Login Form:
Perform a brute force attack on a login form with a specific username (
admin) and passwords from a file (passwords.txt):Dictionary Attack with Custom Usernames:
Conduct a dictionary attack using custom usernames (
users.txt) and passwords (passwords.txt):Using Custom User-Agent Header:
Send requests with a custom User-Agent header (
MyCustomUserAgent):Specifying a Non-Standard Port:
Specify a non-standard port (
8080) for the target service:Using a Proxy for Requests:
Route requests through a SOCKS5 proxy (
localhost:9050):Brute Forcing Different HTTP Methods:
Perform brute force attacks using different HTTP methods (e.g., GET, POST):
Parallel Login Attempts:
Increase the number of parallel login attempts (
16):Limiting Number of Attempts per User:
Limit the number of login attempts per user (
-F):
Other Protocol Examples
Here are examples for brute forcing passwords across various protocols:
SSH:
FTP:
SMTP:
MySQL:
RDP:
VNC:
Telnet:
Hacker's Mantra:Are hackers a threat? The degree of threat presented by any conduct, whether legal or illegal, depends on the actions and intent of the individual and the harm they cause.
Last updated