Quantcast
Channel: Scanner – Security List Network™
Viewing all articles
Browse latest Browse all 271

dorkbot – Scan Google search results for vulnerability.

$
0
0

LEGAL DISCLAMER
The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build to show how resource files can automate tasks.

dorkbot is a modular command-line tool for performing vulnerability scans against a set of webpages returned by Google search queries in a given Google Custom Search Engine. It is broken up into two sets of modules:
+ Indexers – modules that issue a search query and return the results as targets
+ Scanners – modules that perform a vulnerability scan against each target

Targets are stored in a local database upon being indexed. Once scanned, any vulnerabilities found by the chosen scanner are written to a standard JSON report file. Indexing and scanning processes can be run separately or combined in a single command.

Dependencies:
+ PhantomJS http://phantomjs.org/
+ Arachni http://www.arachni-scanner.com/
+ Wapiti http://wapiti.sourceforge.net/
+ Python 2.7.x

Usage:

1. Download PhantomJS and either Arachni or Wapiti for your platform, and make sure you have installed any required dependencies for each.
2. Extract each tool into the tools directory and rename the directory after the tool (dorkbot/tools/phantomjs/, dorkbot/tools/arachni/, etc).
3. Create a Google Custom Search Engine https://www.google.com/cse/ and note the search engine ID, e.g. 012345678901234567891:abc12defg3h.
4. Install python-dateutil (e.g.: pip install python-dateutil)

git clone https://github.com/utiso/dorkbot && cd dorkbot
./dorkbot.py -i google -o engine=012345678901234567891:abc12defg3h,query="filetype:php inurl:id" -s arachni

Source: https://github.com/utiso


Viewing all articles
Browse latest Browse all 271

Trending Articles