Ads 468x60px

Sunday, August 11, 2013

Joomscan in Kali Linux

HOW TO USE JOOMSCAN IN KALI LINUX

Intro - The main purpose of Joomscan is to detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla! web site.Joomla! is probably the most widely-used CMS out there due to its flexibility, user-friendlinesss, extensibility to name a few. So, watching its vulnerabilities and adding such vulnerabilities as KB to Joomla scanner takes ongoing activity.It will help web developers and web masters to help identify possible security weaknesses on their deployed Joomla! sites.

1. How to open
A. GUI Method
Application →Kali linux → Web Applications → Web Vulnerability Scanners → joomscan
                                                             (click image for large view)

B. open terminal and type joomscan

2. This command is used to scan a target for finding the vulenerabilities .
Syntax – joomscan –u target url
Ex – joomscan –u djmaza.in

3. As you can see the scan has been started and as result it is showing us – server information means which server using this website, Anti scanner and joomla firewall etc..

4. This is the 2nd image of our scan result ( sorry I can’t show you whole scan image due to large scanning). So, here you can see fingerprinting, and the most important part  ‘Vulnerabilities’. At the end of #1 scan you will notice this is saying ‘Vulnerable ? Yes’ It means we got a weakness of target website.

5. Here you can see total number of vulnerabilities which found on scan and you can also notice the scan time.

7 comments:

  1. what does N/A mean in the last pic?

    ReplyDelete
  2. Hi, how can I put the results in a html

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
    Replies
    1. Hey Ancy Merina Visit gbhackers.com for new topics on ethical hacking.
      and are you fro kerala ? then we have a big deal to do..

      thanks in advance
      :)

      Delete
  4. Hi,What a wonderful day it is today. Love you Tracy Estabrooks

    ReplyDelete

 

Is TOR Secure??

TOR is not safe to hack!! With putting too much security in middle, you increase the risk of malicious traffic from end station going undetected through this tight-secure loop. It’s a general rule when traffic moves from higher trust to lower trust , the nature of protection provided on either ends should be evaluated and should it match with the data classification level it carries with in. try using some other vpns!!In particular if somebody can observe your traffic and your target's traffic, he can correlate that.

One interesting variant is connecting to a VPN over TOR. That helps with 3), provided you trust the VPN, but you need to figure out a way to buy VPN access anonymously.

Factors Affecting Anonymity Online

IP address- can be resolved by VPN's. User agent- https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/. MAC address - Technetium mac changer. For more information be have anonymous service online. Please visit http://prism-break.org/

Total Pageviews

Total Pageviews

Total Pageviews

Sample Text