• Galileo:一款开源Web应用审计框架


    转载自FreeBuf.COM

    Galileo是一款针对Web应用程序的开源渗透测试工具,可帮助开发和渗透测试人员识别并利用其Web应用程序中的漏洞。

    截图

    screen.png

    安装

    $ git clone https://github.com/m4ll0k/Galileo.git galileo
    $ cd galileo

    安装依赖

    $ pip install -r requirements.txt

    $ apt-get install python-pysocks

    windows

    $ python -m pip install pysocks

    运行

    $ python galileo.py

    使用

    设置全局选项:

    galileo #> set
      Set A Context-Specific Variable To A Value
      ------------------------------------------
      - Usage: set <option> <value>
      - Usage: set COOKIE phpsess=hacker_test
    
    
      Name        Current Value                            Required  Description
      ----------  -------------                            --------  -----------
      PAUTH                                                no        Proxy auth credentials (user:pass)
      PROXY                                                no        Set proxy (host:port)
      REDIRECT    True                                     no        Set redirect
      THREADS     5                                        no        Number of threads
      TIMEOUT     5                                        no        Set timeout
      USER-AGENT  Mozilla/5.0 (X11; Ubuntu; Linux x86_64)  yes       Set user-agent
      VERBOSITY   1                                        yes       Verbosity level (0 = minimal,1 = verbose)

    搜索模块:

    galileo #> search disclosure
    [+] Searching for 'disclosure'...
    
      Disclosure
      ----------
        disclosure/code
        disclosure/creditcard
        disclosure/email
        disclosure/privateip
    

    显示模块:

    galileo #> show modules
    
      Bruteforce
      ----------
        bruteforce/auth_brute
        bruteforce/backup_brute
        bruteforce/file_dir_brute
    
      Disclosure
      ----------
        disclosure/code
        disclosure/creditcard
        disclosure/email
        disclosure/privateip
    
      Exploits
      --------
        exploits/shellshock
    
      Fingerprint
      -----------
        fingerprint/cms
        fingerprint/framework
        fingerprint/server
    
      Injection
      ---------
        injection/os_command_injection
        injection/sql_injection
    
      Scanner
      -------
        scanner/asp_trace
    
      Tools
      -----
        tools/socket

    使用模块:

    galileo #> use bruteforce/backup_brute
    galileo bruteforce(backup_brute) #> 

    设置模块选项

    galileo bruteforce(backup_brute) #> show options
    
      Name      Current Value  Required  Description
      --------  -------------  --------  -----------
      EXTS                     no        Set backup extensions
      HOST                     yes       The target address
      METHOD    GET            no        HTTP method
      PORT      80             no        The target port
      URL_PATH  /              no        The target URL path
      WORDLIST                 yes       Common directory wordlist
    
    galileo bruteforce(backup_brute) #> set HOST www.xxxxxxx.com
    HOST => www.xxxxxxx.com
    galileo bruteforce(backup_brute) #> set WORDLIST /home/m4ll0k/Desktop/all.txt
    WORDLIST => /home/m4ll0k/Desktop/all.txt

    运行:

    galileo bruteforce(backup_brute) #> run

    screen2.png

    *参考来源:github,FB小编 secist 编译,转载自FreeBuf.COM

  • 相关阅读:
    【xsy1230】 树(tree) 点分治+线段树
    【xsy1237】 字符转换 矩阵快速幂
    【xsy1232】Magic 最小割
    【xsy1144】选物品 主席树
    【xsy3423】党² 线段树+李超线段树or动态半平面交
    $Django python中使用redis, django中使用(封装了),redis开启事务(管道)
    $Django redis内存数据库 (知识回顾cmd切换目录)
    $Django 路飞之课程下的分类,用户登陆成功前端存cookie,
    $Django 路飞之小知识回顾,Vue之样式element-ui,Vue绑定图片--mounted页面挂载--路由携带参数
    $Django 路飞学城项目简介
  • 原文地址:https://www.cnblogs.com/cmt110/p/9272354.html
Copyright © 2020-2023  润新知