Introduced:
Analyze the Web site's sensitive directory by probing the server's response (2XX,3XX,4XX,5XX);
Download:
git clone--depth=1 Https://github.com/deibit/cansina;
Characteristics:
Multi-threaded SSL support agent supports data persistence with SQLite database Basic authentication cookie Jar Recovery path Recursive persistent connection complementary tool
Parameters:
-U |
URL address |
-P |
Payload file |
-B |
Do not want to show which response codes such as 200 |
-E |
Just scan those suffixes. |
-C |
Find some keywords in the Web page. You can also add multiple keywords |
-D |
See if there are any characters to look for in the file, and if not, 404 signatures will be returned automatically |
|
|
|
|
Example:
Cansina.py-u Target website-p payload file name
Cansina.py-u target_site_url-p payload_filename-b 404,400,500
Cansina.py-u target_site_url-p payload_filename-e PHP
Cansina.py-u target_site_url-p payload_filename-e php,asp,aspx
Cansina.py-u target_site_url-p payload_filename-c Look_for_this_text
Cansina.py-u target_site_url-p payload_filename-d Look_for_this_text
Cansina.py-u target_site_url-p payload_filename-d