Primary: Exploitation.
Secondary: N/A.
Tool that helps exploiting the detected vulnerabilities present on a web application offering several predefined attack scenarios.
Supported technologies: Web applications (HTTP/HTTPS).
Operative mode: Active.
Compromise the users systems from the web application.
Gain access to directories on the web application.
Reports:
Output reports: ✔
Perform a brute force attack on the web application directories. Start the tool with the following command:
The tool will remain on stand-by waiting for instructions; enter the following command to select the required module.
Enter “show options” to visualize the available options required to configure in order to execute the attack.
Modify the “TARGET” default value for the required web application URL address.
Begin the attack by entering the following.
The tool will display the attack progress for each of the directories tested.
The tool does not save any execution information, so it is required to continuously monitor the output sent to the console to identify those directories that exist in the application.
Link: http://sourceforge.net/projects/Websploit.
Author(s): Fardin Allahverdinazhand.
Contact: 0x0ptim0us [at] gail.com.
License: GNU GENERAL PUBLIC LICENSE Version 3.