-1.9 C
New York
Sunday, February 23, 2025

Buy now

spot_img

Scan website for vulnerabilities in Kali Linux using Grabber

Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website. Grabber is simple, not fast but portable and really adaptable. This software is designed to scan small websites such as personals, forums etc. absolutely not big application: it would take too long time and flood your network.

Why this kind of application ?

This is a very small application (currently 2.5kLOC in Python) and the first reason of this scanner is to have a “minimum bar” scanner for the Samate Tool Evaluation Program at NIST.

Grabber is also for me a nice way to do some automatics verification on websites/scripts I do. Users should know some things about web vulnerabilities before using this soft because it only tell you what vulnerability it is… not how to solve it.

Current featuresScan website for vulnerabilities in Kali Linux using Grabber - blackMORE Ops 1

Because it’s a small tool, the set of vulnerabilities is small…

  1. Cross-Site Scripting
  2. SQL Injection (there is also a special Blind SQL Injection module)
  3. File Inclusion
  4. Backup files check
  5. Simple AJAX check (parse every JavaScript and get the URL and try to get the parameters)
  6. Hybrid analysis/Crystal ball testing for PHP application using PHP-SAT
  7. JavaScript source code analyzer: Evaluation of the quality/correctness of the JavaScript with JavaScript Lint
  8. Generation of a file [session_id, time(t)] for next stats analysis.

Does it scan the JavaScript ?

Yes! It can handle the JavaScript files, parse it to retrieve the server sides scripts names and try to get some parameters name…

What’s nice with Grabber ?

Because every patterns are in a “quite standard” XML file, you can add, or test what ever you want. You can also focus of a kind of vulnerability then do a massive test. You can also do all the test on a single page…

What are you using ?

This application is based on:

  1. Researchs from famous websites/guys:
    • ha.ckers.org (the XSS vector at least)
    • SPI-Dynamics lab/portal
    • Whitehatsec
    • cgisecurity.com
    • OWASP etc.
    • and a huge amount of information given by lots of tools (Pantera, Paros, Wapiti, WebInspect, Hailstorm, AppScan etc.)
  2. Python:

Grabber aim to be simple. It’s a small tool, does not provide any GUI or PDF report! There is XML reports (you can easily create a XSLT to render the XML for you manager).

What needs to be done on Grabber ?

There are couple of things I want to fix/do:

  1. Cookies/Http Auth/Login Page authentification systems
  2. Multi site support (which is not too hard to do due to the XML structure)
  3. Fix the parsers
  4. Make a real/better detection system
  5. Plug a JavaScript engine for real XSS detection
  6. Make a real output
  7. Provide solution for the given vulnerabilities? (not quite sure about this)
  8. Definitely, playing with the differents encodings types.

How do I use Grabber ?

Grabber comes per-installed with Kali Linux.

[toggle title=”Grabber Help Menu – Press to expand” state=”close”]

root@kali:~# grabber -h
Usage: grabber [options]

Options:
  -h, --help            show this help message and exit
  -u ARCHIVES_URL, --url=ARCHIVES_URL
                        Adress to investigate
  -s, --sql             Look for the SQL Injection
  -x, --xss             Perform XSS attacks
  -b, --bsql            Look for blind SQL Injection
  -z, --backup          Look for backup files
  -d SPIDER, --spider=SPIDER
                        Look for every files
  -i, --include         Perform File Insertion attacks
  -j, --javascript      Test the javascript code ?
  -c, --crystal         Simple crystal ball test.
  -e, --session         Session evaluations

[/toggle]

Grabber usage

Spider the web application to a depth of 1 (–spider 1) and attempt SQL (–sql) and XSS (–xss) attacks at the given URL (–url http://kali-test-random-gen.com):
[toggle title=”Grabber Output – Click to expand” state=”close”]

root@kali:~# grabber --spider 1 --sql -xss --url http://kali-test-random-gen.com/
Start scanning... http://kali-test-random-gen.com/
runSpiderScan @  http://kali-test-random-gen.com/  |   # 1
runSpiderScan @  http://kali-test-random-gen.com/  |   # 0
runSpiderScan @  http://kali-test-random-gen.com/category/genel/  |   # 0
runSpiderScan @  http://kali-test-random-gen.com/category/android/  |   # 0
runSpiderScan @  http://kali-test-random-gen.com/category/ios/  |   # 0
Start investigation...
Method = GET  http://kali-test-random-gen.com
[Cookie]    0   :   
[Cookie]    1   :   
Method = GET  http://kali-test-random-gen.com
[Cookie]    0   :   
[Cookie]    1   :   

[/toggle]

Scan website for vulnerabilities in Kali Linux using Grabber - blackMORE Ops 2

 

Source: Grabber Homepage

blackMORE
blackMOREhttp://www.blackmoreops.com
blackMORE Ops is dedicated to How to, Guides, Security features and Tips and Tricks for Linux OS. Thank you for visiting us and follow us here www.blackmoreops.com.

Related Articles

5 COMMENTS

  1. nobody actually goes around laughing at people for being script kiddies unless they themselves were just recently script kiddies.

Leave your solution or comment to help others.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

0FansLike
0FollowersFollow
0SubscribersSubscribe
- Advertisement -spot_img

Latest Articles

Discover more from blackMORE Ops

Subscribe now to keep reading and get access to the full archive.

Continue reading

Privacy Policy on Cookies Usage

Some services used in this site uses cookies to tailor user experience or to show ads.