Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line




Download 6,34 Mb.
Pdf ko'rish
bet179/203
Sana10.01.2024
Hajmi6,34 Mb.
#134102
1   ...   175   176   177   178   179   180   181   182   ...   203
Bog'liq
Linux This Book Includes 4 Manuscripts The Underground Bible

websploit
Webservers in common consist of directories. Directories consist of files. It
should be noted that not all directories are visible to everyone. These are
called hidden directories and can be only visible for the root user.
Hidden directories consist of sensible configuration files that can
compromise the system within a very short time. These hidden directories
can also consist of private password details. We use a web split tool for
making a cross-examination over the available networks.
This software is made of python and is free to download from the wget
package manager system. After installing, start it using the tool name in the
Linux shell.
Below is the command using apt shell command that will install the
websploit framework:
example@ linuxwar : wget websploit
Web sploit consists of a lot of modules such as wireless and network
modules for example. It should be remembered that web sploit works in
coincidence with the Metasploit. Metasploit an exploit maker tool and can
help users insert exploits in various files. We will learn about these
Metasploit functionalities in detail in the last chapter.
Now we will look at the procedure where hidden directories can be
discovered.
a) Before starting you can filter out the error options to wield out some of
the most famous errors like 404 error not found.
b) It is already installed in Kali Linux and can be found in the module’s
directory. The directory scanner module which is one of the most important
modules in the websploit tool can be used to find out the directories and its
syntax forms .


Below we explain some of the commands that are present in the directory
scanner module which can be used to scan hidden directories:
1) Show - This command will display all the web modules that are present.
When hackers deal with a lot of exploits they often get confused and mess
up things. For this exact reason, web sploit consists of inbuilt modules that
are used to find vulnerable directories. And this show command can help us
find some of these for us.
example@ linuxwar : show websploit www.exampleweb.com
2) Verbosity
Verbosity is a simple statement that lets us set the number of results that can
appear on the Linux shell. When we start searching hidden directories
usually a lot are found and can make things confusing. To get away from
this problem we can use verbosity command to display the custom
directories. There is also an option that will make us look at all the things in
a static form.
3) And the next important command is RUN which helps us to run the
exploits with the websites we desire. We can also use this network
transmitting system.
example@ linuxwar : run websploit www.exampleweb.co m
When you follow these commands with perfection then there are huge
chances of websites getting compromised.

Download 6,34 Mb.
1   ...   175   176   177   178   179   180   181   182   ...   203




Download 6,34 Mb.
Pdf ko'rish

Bosh sahifa
Aloqalar

    Bosh sahifa



Linux: This Book Includes 4 Manuscripts. The Underground Bible to the unix operating System with Tools On Security and Kali Hacking to Understand Computer Programming, Data Science and Command Line

Download 6,34 Mb.
Pdf ko'rish