Whitewidow 1.5.0 - SQL Vulnerability Scanner


Whitewidow l� m?t tool t? d?ng qu�t l? h?ng SQL , kh? nang qu�t th�ng qua m?t danh s�ch t?p tin, ho?c c� th? Google cho c�c trang web d? b? t?n thuong .
 N� d?nh d?ng t? d?ng t?p tin, d?a ch? IP, th�ng tin m�y ch?, c� ph�p SQL injection, v� m?t m�i tru?ng r?t GOOD
Chuong tr�nh n�y d� du?c t?o ra cho m?c d�ch h?c t?p, v� du?c thi?t k? d? d?y cho ngu?i s? d?ng nh?ng g� d? b? HACK !!
?nh ch?p m�n h�nh 




S? d?ng 
ruby whitewidow.rb -h
In c�c trang tr? gi�p 
ruby whitewidow.rb -c
S? displlay c�c kho?n t�n d?ng, cung c� th? du?c ch?y k?t h?p v?i -f ho?c -d 
ruby whitewidow.rb -l
S? hi?n th? c�c th�ng tin ph�p l�, cung c� th? du?c ch?y k?t h?p v?i -f ho?c -d 
ruby whitewidow.rb -d
S? ch?y whitewidow ? ch? d? m?c d?nh v� Google b?ng c�ch s? d?ng c�c truy v?n t�m ki?m trong thu m?c lib 
ruby whitewidow.rb -d --banner
S? Google v� ?n c�c bi?u ng? 
ruby whitewidow.rb -d --proxy 127.0.0.1:80
c?u h�nh proxy, ph?i s? d?ng ":" 
ruby whitewidow.rb -d --dry-run
n� s? kh�ng qu�t c�c l? h?ng, s? nh?c n?u b?n mu?n ch?y m?t m�y qu�t hay kh�ng 
ruby whitewidow.rb -d --dry-run --batch
kh�ng nh?c b?n cho b?t c? di?u g�, s? kh�ng ch?y m?t qu�t 
ruby whitewidow.rb -f <path/to/file>
S? ch?y Whitewidow th�ng qua m?t t?p tin, b?n s? kh�ng c?n ph?i cung c?p whitewidow du?ng d?n d?y d? d?n t?p tin, ch? c?n cung c?p cho n� c�c du?ng d?n trong thu m?c whitewidow ch�nh n�. Ngo�i ra, b?n s? kh�ng c?n m?t d?u g?ch ch�o b?t d?u. V� d?: 

- whitewidow.rb -f tmp/sites.txt #<= CORRECT
- whitewidow.rb -f /home/users/me/whitewidow-1.0.6/tmp/sites.txt #<= INCORRECT
ruby whitewidow.rb --run-x 10
S? ch?y 10 ch?y kh� trong ch? d? h�ng lo?t v� hi?n th? kh�ng c� th�ng tin kh�c (ph�p l�, bi?u ng?, vv ..) 
ruby whitewidow.rb -s URL
S? nh?n URL v� tr�ch xu?t t?t c? c�c li�n k?t t? d�, luu ch�ng v�o m?t t?p tin. Sau d� s? ch?y c�c t?p tin th�ng qua t?p whitewidows 


gem 'mechanize'  
gem 'nokogiri'
gem 'rest-client'

�? c�i d?t t?t c? ph? thu?c Ruby, h�y l�m theo c�c m?u sau: 
cd whitewidow
bundle install

No comments:

Powered by Blogger.