BASH [ Yuki Chan – The Auto Web Penetration Testing Tool ] - Intech Network

Ethical-Hacking & penetration testing & network security assessments

11/26/2018

BASH [ Yuki Chan – The Auto Web Penetration Testing Tool ]

Yuki Chan – The Auto Web Penetration Testing Tool


Yuki Chan is an open source tool that automates some of the information gathering and web application penetration testing process.  The tool can automate  a number of  penetration testing tasks, such as information gathering about the target web application, open source intelligence, and vulnerabilities assessment, CMS information, and system enumeration, SSL security auditing, and fuzzing. Yuki Chan tool is loaded with a large number of modules including Metagoofil, XSS Scanner, DNSRecon, Wafninja, Spaghetti, Joomscan, WPSeku, WPscanner, a2sv, Dirsearch, Whatweb, and sublist3r. Each module runs automatically one after another to scan the target applications.

Yuki Chan Installation Guide

Yuki Chan works only with Linux OS. Besides the preloaded modules mentioned above, Yuki Chan requires the following tools as well to operate.

  • Nmap

  • SSLScan

  • SSLyze

  • Wafwoof

  • WPScan

These tools can be manually installed if they are not already installed on your Linux system. For example Nmap can be installed using the following command.

apt-get install nmap

Wafwoof can be installed by first cloning the tool using the following path.

git clone https://github.com/EnableSecurity/wafw00f.git

After cloning the tool, move to the wafwoof directory and run the setup file.

cd wafw00f python setup.py install

WPScan and SSLScan can be installed using the following paths.

git clone https://github.com/wpscanteam/wpscan.git git clone https://github.com/ rbsec/sslscan.git

To install SSLyze, use the following commands.

git clone https://github.com/nabla-c0d3/sslyze.git cd sslyze pip install -r requirements.txt --target ./lib

Once the required modules are installed, clone the Yuki Chan tool and complete the installation process using the following commands.

Yuki Chan the Auto Pentest Cloning

git clone https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest.git cd Yuki-Chan-The-Auto-Pentest chmod 777 wafninja joomscan install-perl-module.sh yuki.sh chmod 777 Module/WhatWeb/whatweb pip install -r requirements.txt ./install-perl-module.sh

Yuki chan the auto pentest perl module installation

The above commands install the required libraries and scripts to run the tool without any errors.

Yuki Chan Working

The following command is used to run Yuki Chan.

./yuki.sh

The command not only runs the tool but also prompts for the target host to start scanning and auditing.

Yuki target scan

Once the url is provided, the tool automatically loads each module mentioned above to scan the target for reconnaissance and vulnerability assessments. For instance, the tool starts with Whois command to gather owner’s information. It runs DNS tool to gather server information.

whois and server lookup

Then it starts with the Harvester and the Metagoofil to look for email addresses and the interesting documents.

Yuki meta goofil document search

The other vulnerability assessment tools are automatically executed in a similar fashion to scan the target for possible vulnerabilities or useful information.

Aucun commentaire:

Enregistrer un commentaire