Yuki
Chan is an open source tool that automates some of the information
gathering and web application penetration testing process. The tool can
automate a number of penetration testing tasks, such as information
gathering about the target web application, open source intelligence,
and vulnerabilities assessment, CMS information, and system enumeration,
SSL security auditing, and fuzzing. Yuki Chan tool is loaded with a
large number of modules including Metagoofil, XSS Scanner, DNSRecon,
Wafninja, Spaghetti, Joomscan, WPSeku, WPscanner, a2sv, Dirsearch,
Whatweb, and sublist3r. Each module runs automatically one after another
to scan the target applications.
Yuki Chan Installation Guide
Yuki Chan works only with Linux OS. Besides the preloaded modules
mentioned above, Yuki Chan requires the following tools as well to
operate.
Nmap
SSLScan
SSLyze
Wafwoof
WPScan
These tools can be manually installed if they are not already
installed on your Linux system. For example Nmap can be installed using
the following command.
apt-get install nmap
Wafwoof can be installed by first cloning the tool using the following path.
git clone https://github.com/EnableSecurity/wafw00f.git
After cloning the tool, move to the wafwoof directory and run the setup file.
cd wafw00f
python setup.py install
WPScan and SSLScan can be installed using the following paths.
git clone https://github.com/wpscanteam/wpscan.git
git clone https://github.com/ rbsec/sslscan.git
To install SSLyze, use the following commands.
git clone https://github.com/nabla-c0d3/sslyze.git
cd sslyze
pip install -r requirements.txt --target ./lib
Once the required modules are installed, clone the Yuki Chan tool and
complete the installation process using the following commands.
git clone https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest.git
cd Yuki-Chan-The-Auto-Pentest
chmod 777 wafninja joomscan install-perl-module.sh yuki.sh
chmod 777 Module/WhatWeb/whatweb
pip install -r requirements.txt
./install-perl-module.sh
The above commands install the required libraries and scripts to run the tool without any errors.
Yuki Chan Working
The following command is used to run Yuki Chan.
./yuki.sh
The command not only runs the tool but also prompts for the target host to start scanning and auditing.
Once the url is provided, the tool automatically loads each module
mentioned above to scan the target for reconnaissance and vulnerability
assessments. For instance, the tool starts with Whois command to gather
owner’s information. It runs DNS tool to gather server information.
Then it starts with the Harvester and the Metagoofil to look for email addresses and the interesting documents.
The other vulnerability assessment tools are automatically executed
in a similar fashion to scan the target for possible vulnerabilities or
useful information.
Aucun commentaire:
Enregistrer un commentaire