Menu

CeWL-en




CeWL

Phase(s):

Primary: Mapping.
Secondary: N/A.

Description:

Tool that performs a Web application spidering focused on recollecting key words present inside the Web content for further use on usernames and passwords dictionaries.

Objective:

  • Recollect substantial information present within the content of the Web applications.

Features:

Supported technologies: HTTP/HTTPS web applications.

Operative mode: Active.

Recollect substantial information:

  • Returns a key words list to be used as source for usernames and passwords dictionaries.

Reports:
Output reports:

  • Key words list detected inside the content of the Web application.

Basic usage:

Begin a scan. The following command initiates a scan on a Web application.

./cewl.rb -v --write="[directory]/cewl" [domain or server IP address]


Where:

  • -v: Verbose mode.
  • --write: Output of the key words list file.
  • URL: Domain or IP address of the Web application to scan.

The tool begins the spidering through the Web application to detect which resources (Web pages) will be used in the key words analysis. By default the tool will crawl by a defined deep level of 2 links within the same domain.

Starting at http://mydomain.com/myapplication/
Visiting: http://mydomain.com/myapplication/, got response code 200
Attribute text found:
Password, Password1, K7827
...


Based on the spidering results, the Web content of the detected resources is analyzed in order to retrieve a list of key words that may refer to sensitive or restricted information that could be used in usernames and passwords dictionaries.

Example of key words list:

0000FF
001
1990
210B
232
808000
Anonymous
COMPANY
Challenge
Code
Corporation
Enter
GREEK
Greece
K7827
LOGISTICS
Password
Password1


Resources:

Link: http://www.digininja.org/projects/cewl.php
Author(s): Robin Wood
Contact: robin [at] digininja.org
License: CC BY-SA 2.0 UK