Yuki
Chan is an open source tool that automates some of the information
gathering and web application penetration testing process. The tool can
automate a number of penetration testing tasks, such as information
gathering about the target web application, open source intelligence,
and vulnerabilities assessment, CMS information, and system enumeration,
SSL security auditing, and fuzzing. Yuki Chan tool is loaded with a
large number of modules including Metagoofil, XSS Scanner, DNSRecon,
Wafninja, Spaghetti, Joomscan, WPSeku, WPscanner, a2sv, Dirsearch,
Whatweb, and sublist3r. Each module runs automatically one after another
to scan the target applications.
Yuki Chan Installation Guide
Yuki Chan works only with Linux OS. Besides the preloaded modules
mentioned above, Yuki Chan requires the following tools as well to
operate.
Nmap
SSLScan
SSLyze
Wafwoof
WPScan
These tools can be manually installed if they are not already
installed on your Linux system. For example Nmap can be installed using
the following command.
apt-get install nmap
Wafwoof can be installed by first cloning the tool using the following path.
The above commands install the required libraries and scripts to run the tool without any errors.
Yuki Chan Working
The following command is used to run Yuki Chan.
./yuki.sh
The command not only runs the tool but also prompts for the target host to start scanning and auditing.
Once the url is provided, the tool automatically loads each module
mentioned above to scan the target for reconnaissance and vulnerability
assessments. For instance, the tool starts with Whois command to gather
owner’s information. It runs DNS tool to gather server information.
Then it starts with the Harvester and the Metagoofil to look for email addresses and the interesting documents.
The other vulnerability assessment tools are automatically executed
in a similar fashion to scan the target for possible vulnerabilities or
useful information.
Aucun commentaire:
Enregistrer un commentaire