Get admin backend address with Websploit

Source: Internet
Author: User
Tags cloudflare git clone

1, use Web/dir_scanner

2, set TARGET http://www.****.com

3, run

source:https://sourceforge.net/projects/websploit/

Websploit advanced MITM framework[+]autopwn–used from Metasploit for Scan and Exploit Target service[+]wmap–scan,crawl Er Target used from Metasploit wmap plugin[+]format infector–inject Reverse & bind payload to file Format[+]phpmya DMin scanner[+]cloudflare Resolver[+]lfi bypasser[+]apache Users scanner[+]dir bruter[+]admin Finder[+]MLITM attack– Mans left in the middle, XSS Phishing Attacks[+]mitm–man in the middle Attack[+]java Applet attack[+]mfod Attack vector[+ ]arp Dos attack[+]web Killer attack[+]fake Update attack[+]fake Access point Attack[+]wifi honeypot[+]wifi jammer[+]wifi D Os[+]wifi Mass de-authentication attack[+]bluetooth POD Attack

# cd/root# git clone https://github.com/websploit/websploit.git# cd websploit#.wsf-update.py# ./websploit          ( ,                )   &NB Sp           (             )          ) (        (   /     ) \      (&nbsp ;   (        ((_) () \)    )) (\ ) \ ()) (    '  )   (_) ( ) \& nbsp ) \ ())         _ (()) \_) ()/((_) (_) \ ) \ /(   _   ) \ ((_) (_))/  & nbsp     \ ((_)//(_))   | | (_) ((_)((_)_\ | | (_) (_) | |_         \ \/\///-_) | ' _ \ (_-<| ' _ \] | |/_ \| | |   _|          \_/\_/  \___| |_.__//__/| __/|_|\___/|_| \__|                                                  –=[websploit advanced MITM framework        +-**-==[ version:3.0.0        +-**-==[codename:katana        +-**-==[available Modules: 20               –=[update Date: [r3.0.0-000 20.9.2014]wsf > Helpcommands&nbs P               Description —————           —————-set                     set Value of Options to modulesscan      &NBS P             Scan Wifi (Wireless Modules) stop                    Stop Attack & Scan (Wireless Modules) run                     execute moduleuse                     select Mo Dule for Useos&nbsP                     Run Linux Commands (ex:os ifconfig) back  &nbsp ;                 Exit current moduleshow modules            Show Modules of Databaseshow options            Show current options of Selec Ted moduleupgrade                 get New versionupdate      & nbsp           Update websploit frameworkabout                   about US

WSF > upgrade[*]checking for New Version, please Wait ... [*] New Version not Available, which is Latest Version of the Websploit Framework.

WSF > Show Modulesweb Modules Description ——————-——————— web/apache_users Scan Directory of Apache usersweb/dir_scanner directory Scannerweb/wmap informatio n Gathering from Victim Web Using (Metasploit Wmap) web/pma PHPMyAdmin Login Page scannerweb/cloudf Lare_resolver CloudFlare Resolver

Network Modules Description ——————-——————— network/arp_dos arp Cache denial of Service attacknetwork/mfod Middle Finger of Doom attacknetwork/mitm man in the MIDDL E Attacknetwork/mlitm Mans left in the middle Attacknetwork/webkiller TCP Kill attacknetwor K/fakeupdate Fake Update Attack Using DNS spoofnetwork/arp_poisoner ARP poisoner

Exploit Modules Description ——————-——————— exploit/autopwn Metasploit autopwn S Erviceexploit/browser_autopwn Metasploit Browser Autopwn serviceexploit/java_applet java applet Attack (Using HTML)

Wireless/bluetooth Modules Description ——————-——————— wifi/wifi_jammer wifi jammerwifi/wifi                _dos Wifi dos attackwifi/wifi_honeypot Wireless honeypot (Fake AP) Wifi/mass_deauth Mass deauthentication attackbluetooth/bluetooth_pod bluetooth Ping of Death Attack

Get admin backend address with Websploit

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.