Menu

Grendel_Scan-en




Grendel Scan

Phase(s):

Primary: Mapping.
Secondary: Discovery.

Description:

Scanner tool that execute different testing modules that range from an application spidering and content enumeration to vulnerability scanning.

Objective:

  • Visualize the application resources.
  • Automated detection of common vulnerabilities such as Cross-Site Scripting & SQL Injection.

Features:

Supported technologies: HTTP/HTTPS Web Applications.

Operative mode: Active.

Visualize the application resources.

  • Web application mapping (HTML) through different testing modules: URL detection with regular expressions, HTML tags and attributes URL and Form parameter manipulation and search engines mapping (Google, Yahoo and Live.com).
  • Common resources enumeration: files and directories.
  • Creation of a local mirror of the Web application.

Automated detection of common vulnerabilities such as Cross-Site Scripting & SQL Injection.

  • Vulnerabilities detection through the following testing modules: SQL Injection, Cross-Site Scripting, Directory Listing, Cross Site Request Forgery, Fuzzing.
  • Integration with Nikto testing modules.

Reports:
Output reports:

  • Plain text files containing the detected URL’s inside the spidering testing module.
  • HTML or plain text file with the vulnerability scanning results.

Basic usage:

Run an application spidering. Start the tool and initiate the scan configuration in the “General Setting” tab.

Where:

  • Base URLs: Web application URLs. (By pressing the “Add” button)
  • Output directory: Save location for the scanning results.

Based on the application, additional configuration are available such as:

a. Petition configuration (number of request, connections or failed request).
b. “User Agent” header customization.
c. Application authentication (Basic and Form based).
d. Scan restrictions configuration (restricted parameters and links).

Inside the “Test Module Section” tab are listed the available test modules to be configured for the scan; this modules range from an application spidering to a vulnerabilities scan that include common vulnerabilities such as Cross-Site Scripting and SQL Injection.

The following test modules are selected:
• “Spider-->HTML Tag-Request”. Test module which processes the HTML Web content searching for tags containing links referencing to the application.
• “Application architecture-->Website map”. Test module which exports the detected URLs into a text files.
And begin the scan selecting the “Scan-->Start Scan” option.

The scan will begin showing a test module counter at the bottom on the “Queue Sizes-->Testers” textbox. The counter will reach zero once all test modules are completed and will begin generating the results.

Finally, the tools will display a pop up message of the scan completion.

In the output directory specified will be available the following reports:
• report.html. Vulnerability scanning results.
• web-site-map.txt. Test files listing the detected application URLs.
• Folder “http-transactions”. Transaction log with the entire petitions performed by the tool.

Resources:

Link: http://www.grendel-scan.com
Author(s): David Byrne
Eric Duprey
Contact:
License: GNU Public License version 3 (GPLv3)