<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to HTExploit-en</title><link>https://sourceforge.net/p/maguey/wiki/HTExploit-en/</link><description>Recent changes to HTExploit-en</description><atom:link href="https://sourceforge.net/p/maguey/wiki/HTExploit-en/feed" rel="self"/><language>en</language><lastBuildDate>Wed, 11 Dec 2013 17:24:47 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/maguey/wiki/HTExploit-en/feed" rel="self" type="application/rss+xml"/><item><title>HTExploit-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/HTExploit-en/</link><description>&lt;div class="markdown_content"&gt;&lt;pre&gt;--- v1
+++ v2
@@ -7,70 +7,63 @@
 &lt;h1 style="color: #4CAB68;"&gt;HTExploit&lt;/h1&gt;
 &lt;!-- **********************  PHASES ********************** --&gt;

-&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;1769242397
-Primary: Discovery.
+&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
+Primary: Exploitation.
 Secondary:  N/A.

 &lt;!-- **********************  DESCRIPTION ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
-Tool that performs a vulnerability scan on web applications. It runs in two modes, the first one performs a spidering  of the web application and the second one uses dictionary based brute force attacks.
+Tool that leverages an improperly configured .htaccess file in Apache + PHP environments. It performs a scan by sending petitions with unrecognized HTTP methods to the Apache application server in order to gain access to restricted PHP files.

 &lt;!-- **********************  OBJECTIVES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
 &lt;ul&gt;
-&lt;li&gt;Detect vulnerabilities on the web application.
+&lt;/li&gt;&lt;li&gt;Obtain PHP files to analyze their content.
 &lt;/li&gt;&lt;/ul&gt;

 &lt;!-- **********************  FEATURES ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
-&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP).
+&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP/HTTPS).

 &lt;b&gt;Operative mode:&lt;/b&gt; Active.

 &lt;p&gt;
-Detect vulnerabilities on the web application.
+Obtain PHP files to analyze their content.
 &lt;ul&gt;
-&lt;li&gt;Performs a predefined and configurable spidering on the web application; configurations include domain on the scope, restricted URLs and parameters, etc.
-&lt;/li&gt;&lt;li&gt;dentify common vulnerabilities such as Cross Site Script, SQL Injection, Path Traversal, Information Disclosure, etc.
-&lt;/li&gt;&lt;li&gt;Provides a configurable dictionary base brute force attack functionality in order to detect commons resources such as administrative, default and test pages, files backups (.old), etc.
-&lt;/li&gt;&lt;li&gt;Has the capability to include self-defined dictionaries to be used on the brute force module.
-&lt;/li&gt;&lt;/ul&gt;
+&lt;li&gt;Sends petitions with unrecognized HTTP methods from a configurable base dictionary of common PHP file names.
+&lt;li&gt;Automated file download in HTML format from the detected PHP files.
+&lt;li&gt;Provides a report from the downloaded files.
 &lt;/li&gt;&lt;/li&gt;&lt;/li&gt;&lt;/p&gt;

 &lt;p&gt;
 &lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
 Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
-&lt;br /&gt;
-Reports in HTML format which includes the visited URLS and detected vulnerabilities divided into three sections:
 &lt;ul&gt;
-&lt;li&gt;URL: URLs detected by the spidering module.
-&lt;/li&gt;&lt;li&gt;Document type: URL categorization by content based on the response.
-&lt;/li&gt;&lt;li&gt;Detected vulnerabilities: URL groups by matching vulnerabilities.
-&lt;/li&gt;&lt;/ul&gt;
+&lt;li&gt;Report in HTML which includes the list of downloaded files.
 &lt;/li&gt;&lt;/p&gt;

 &lt;!-- **********************  USAGE ********************** --&gt;

 &lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
-&lt;b&gt;Realizar una ejecución con la lista por defecto de la herramienta. &lt;/b&gt;La siguiente instrucción inicia la ejecución.
+&lt;b&gt;Perform a scan with the predefined data dictionary. &lt;/b&gt;The following instruction initiates the scan on the web application.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 ./htexploit -u [URL] -o [Directorio] –w [Directorio]/wordlist.txt 
 &lt;/div&gt;&lt;br /&gt;

 &lt;p&gt;
-Dónde:
+Where:
 &lt;ul&gt;
-&lt;li&gt;-u: URL de la aplicación Web.
-&lt;/li&gt;&lt;li&gt;-o: Directorio donde se guarda el reporte.
-&lt;/li&gt;&lt;li&gt;-w: Lista de palabras que se utilizarán para la ejecución del escaneo. En caso de no estar definida en el comando se utiliza una lista por defecto.
+&lt;/li&gt;&lt;li&gt;-u: Web application URL address. 
+&lt;/li&gt;&lt;li&gt;-o: Report export path. 
+&lt;/li&gt;&lt;li&gt;-w: Data dictionary to be used for the scan. In case no dictionary is provided the tool will used the default dictionary.
 &lt;/li&gt;&lt;/ul&gt;
 &lt;/p&gt;

-La herramienta comienza con una comprobación que identifica si la URL es vulnerable, después solicita confirmación para realizar un escaneo completo con la lista de palabras que se proporcionó en el comando.
+The tool will begin testing the provided URL in order to verify if it’s vulnerable to the exploit, in case it’s unsuccessful the tool will recommend running a full scan with a data dictionary.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 _    _   _______   ______                  _           _   _   &lt;br /&gt;
@@ -88,13 +81,13 @@
 Would you like to run the Full Scan module? [Y/n]: &lt;br /&gt;
 &lt;/div&gt;&lt;br /&gt;

-La herramienta crea el directorio donde se guarda el reporte final y comienza a realizar el escaneo completo. 
+The tool then will create the directory for saving the report and downloaded files.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 [+] Creating report... &lt;br /&gt;
 &lt;/div&gt;&lt;br /&gt;

-Cuando finaliza el escaneo, muestra un mensaje de los resultados obtenidos y la ruta donde se guardó el reporte.
+Then the scan is completed, the tool will display a successful message along the path of the exported results.

 &lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
 [+] Scan completed.&lt;br /&gt;
@@ -105,7 +98,8 @@

 &lt;/div&gt;&lt;br /&gt;

-Ejemplo de reporte:
+&lt;b&gt;Example report:&lt;/b&gt;
+
 &lt;a href="https://sourceforge.net/p/maguey/wiki/repo_img/attachment/HTExploit-01.jpg"&gt;
 [[img src=https://sourceforge.net/p/maguey/wiki/repo_img/attachment/HTExploit-01.jpg alt=image height=50% width=50%]]
 &lt;/a&gt;
&lt;/pre&gt;
&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 17:24:47 -0000</pubDate><guid>https://sourceforge.net862623614185e6a8431f040c1dc6ec784758e88c</guid></item><item><title>HTExploit-en modified by Maguey</title><link>https://sourceforge.net/p/maguey/wiki/HTExploit-en/</link><description>&lt;div class="markdown_content"&gt;&lt;!-- ###################################### ENGLISH VERSION ###################################### --&gt;
&lt;p&gt;&lt;img height="25%" src="https://sourceforge.net/p/maguey/wiki/Home/attachment/LogoMaguey.png" style="float: right;" width="25%" /&gt;&lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;div id="link" style="text-align: right;"&gt;&lt;p&gt;&lt;a href="https://sourceforge.net/p/maguey/wiki/Toolset-en/" style="color: #4CAB68; text-decoration: underline;"&gt;Back&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://sourceforge.net/p/maguey/wiki/HTExploit-es" style="color: #4CAB68; text-decoration: underline;"&gt;Español&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;
&lt;h1 style="color: #4CAB68;"&gt;HTExploit&lt;/h1&gt;
&lt;!-- **********************  PHASES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Phase(s):&lt;/h3&gt;
&lt;p&gt;1769242397&lt;br /&gt;
Primary: Discovery.&lt;br /&gt;
Secondary:  N/A.&lt;/p&gt;
&lt;!-- **********************  DESCRIPTION ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Description: &lt;/h3&gt;
&lt;p&gt;Tool that performs a vulnerability scan on web applications. It runs in two modes, the first one performs a spidering  of the web application and the second one uses dictionary based brute force attacks.&lt;/p&gt;
&lt;!-- **********************  OBJECTIVES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Objective:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Detect vulnerabilities on the web application.
&lt;/li&gt;&lt;/ul&gt;
&lt;!-- **********************  FEATURES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Features:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Supported technologies:&lt;/b&gt; Web applications (HTTP).&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Operative mode:&lt;/b&gt; Active.&lt;/p&gt;
&lt;p&gt;
Detect vulnerabilities on the web application.
&lt;ul&gt;
&lt;li&gt;Performs a predefined and configurable spidering on the web application; configurations include domain on the scope, restricted URLs and parameters, etc.
&lt;/li&gt;&lt;li&gt;dentify common vulnerabilities such as Cross Site Script, SQL Injection, Path Traversal, Information Disclosure, etc.
&lt;/li&gt;&lt;li&gt;Provides a configurable dictionary base brute force attack functionality in order to detect commons resources such as administrative, default and test pages, files backups (.old), etc.
&lt;/li&gt;&lt;li&gt;Has the capability to include self-defined dictionaries to be used on the brute force module.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;
&lt;b&gt;Reports:&lt;/b&gt;&lt;br /&gt;
Output reports:  &lt;span style="color: #4CAB68; font-weight: bold; font-style: italic; font-size: 20px;"&gt;&amp;#10004;&lt;/span&gt;
&lt;br /&gt;
Reports in HTML format which includes the visited URLS and detected vulnerabilities divided into three sections:
&lt;ul&gt;
&lt;li&gt;URL: URLs detected by the spidering module.
&lt;/li&gt;&lt;li&gt;Document type: URL categorization by content based on the response.
&lt;/li&gt;&lt;li&gt;Detected vulnerabilities: URL groups by matching vulnerabilities.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;!-- **********************  USAGE ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Basic usage:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Realizar una ejecución con la lista por defecto de la herramienta. &lt;/b&gt;La siguiente instrucción inicia la ejecución.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
./htexploit -u [URL] -o [Directorio] –w [Directorio]/wordlist.txt 
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;
Dónde:
&lt;ul&gt;
&lt;li&gt;-u: URL de la aplicación Web.
&lt;/li&gt;&lt;li&gt;-o: Directorio donde se guarda el reporte.
&lt;/li&gt;&lt;li&gt;-w: Lista de palabras que se utilizarán para la ejecución del escaneo. En caso de no estar definida en el comando se utiliza una lista por defecto.
&lt;/li&gt;&lt;/ul&gt;
&lt;/p&gt;
&lt;p&gt;La herramienta comienza con una comprobación que identifica si la URL es vulnerable, después solicita confirmación para realizar un escaneo completo con la lista de palabras que se proporcionó en el comando.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
_    _   _______   ______                  _           _   _   &lt;br /&gt;
| |  | | |__   __| |  ____|                | |         (_) | |  &lt;br /&gt;
| |__| |    | |    | |__    __  __  _ __   | |   ___    _  | |_ &lt;br /&gt;
|  __  |    | |    |  __|   \ \/ / | '_ \  | |  / _ \  | | | __|&lt;br /&gt;
| |  | |    | |    | |____   &gt;  &lt;  | |_) | | | | (_) | | | | |_ &lt;br /&gt;
|_|  |_|    |_|    |______| /_/\_\ | .__/  |_|  \___/  |_|  \__|&lt;br /&gt;
                                   | |                          &lt;br /&gt;
                                   |_|  v0.77&lt;br /&gt;
&lt;br /&gt;
[-] http://localhost/aplicacion// is probably NOT exploitable :(&lt;br /&gt;
[-] You should run the Full Scan module anyway, just in case.&lt;br /&gt;
&lt;br /&gt;
Would you like to run the Full Scan module? [Y/n]: &lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;La herramienta crea el directorio donde se guarda el reporte final y comienza a realizar el escaneo completo. &lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
[+] Creating report... &lt;br /&gt;
&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Cuando finaliza el escaneo, muestra un mensaje de los resultados obtenidos y la ruta donde se guardó el reporte.&lt;/p&gt;
&lt;div id="code" style="background-color: #85BF93; padding-top: 20px; padding-right: 0px; padding-bottom: 20px; padding-left: 40px; margin-top: 0px; margin-right: 10px; margin-bottom: 0px; margin-left: 10px; border: 0px solid;"&gt;
[+] Scan completed.&lt;br /&gt;
[+] 3 total files were downloaded, after 2 iteration(s)&lt;br /&gt;
[+] The final report file is in '/tools/explotation/htexploit-0.77/Rep_Miapp'&lt;br /&gt;
&lt;br /&gt;
[x] Keep shopping at the HTExploit store! :)

&lt;/div&gt;
&lt;p&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Ejemplo de reporte:&lt;br /&gt;
&lt;a href="https://sourceforge.net/p/maguey/wiki/repo_img/attachment/HTExploit-01.jpg"&gt;&lt;br /&gt;
&lt;img alt="image" height="50%" src="https://sourceforge.net/p/maguey/wiki/repo_img/attachment/HTExploit-01.jpg" width="50%" /&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;!-- **********************  RESOURCES ********************** --&gt;
&lt;h3 style="color: #4CAB68;"&gt;Resources:&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Link:&lt;/b&gt; &lt;a href="http://www.htexploit.org" rel="nofollow"&gt;http://www.htexploit.org&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Author(s):&lt;/b&gt; Matias Katz&lt;br /&gt;
&lt;b&gt;Contact:&lt;/b&gt; &lt;a href="http://www.htexploit.org/contact.php" rel="nofollow"&gt;http://www.htexploit.org/contact.php&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;License:&lt;/b&gt; GNU GENERAL PUBLIC LICENSE Version 3&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Maguey</dc:creator><pubDate>Wed, 11 Dec 2013 16:33:25 -0000</pubDate><guid>https://sourceforge.net25046135104f66707045902ca7a340fef0f8f845</guid></item></channel></rss>