Skip to content

Automates common and important steps when (pen-)testing a webserver.

Notifications You must be signed in to change notification settings

dombg1337/webScan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 

Repository files navigation

webScan (c) dombg

Description

The script automates common and important steps in (pen-)testing a webserver to save time during an engagement or for sys-admins after setting it up.

Even though these are common checks, the tests performed barely touch the surface of web-app-security audits and only check common things of the webserver hosting the web-app. Web-app-security audits require a lot of manual testing. It is recommended to follow guides like the one from OWASP: https://owasp.org/www-project-web-security-testing-guide/v42/ and to supplement it with additional resources.

Execution

  1. Run nmap safe scripts (-sC) and service+version (-sV) enumeration on IP and PORT.
  2. Run cipher checks with nmap's ssl_enum-ciphers script.
  3. Perform certificate checks (if domain is provided).
  4. Run nikto scan on domain, or else on ip:port.
  5. Optionally runs nmap vuln scripts (--scripts="vuln") as an additional scan.

Output is stored in all possible formats (nikto in txt,xml).

Help

image

Mind: Please don't grant users permanent sudo rights to this script, easy PrivEsc via Command Injection since I don't sanitize any input.

Usage examples

sudo ./webScan --ip 192.168.1.2 --port 443
sudo ./webScan --ip 192.168.1.2 --port 443 --domain foo.bar --vuln

Requirements

Disclaimer

webScan is written for webserver assessments where the scanning is explicitly allowed by the owner of the target system, please use it responsively. I'm not responsible for any misuse of this tool.

About

Automates common and important steps when (pen-)testing a webserver.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages