Giter Club home page Giter Club logo

altair's Introduction

ALTAIR - A Modular Web Vulnerability Scanner
Copyleft by Simone Margaritelli <[email protected]>
http://www.evilsocket.net - http://www.backbox.org

Usage: altair [options] -u <target>

EXAMPLES:
  altair --filter=lfi,rfi --url=http://www.somesite.com
  altair --filter=sqli --load-modules=sqlmap --url=http://www.somesite.com

Options:
  -h, --help            show this help message and exit
  -t THREADS, --threads=THREADS
                        Max simultaneous threads.
  -e ALLOWEDEXTENSIONS, --ext=ALLOWEDEXTENSIONS
                        Comma separated allowed extensions.
  -a USERAGENT, --ua=USERAGENT
                        Custom user agent.
  -d, --enable-delay    Enable crawling delay.
  -s CRAWLDELAY, --crawl-delay=CRAWLDELAY
                        Crawling delay in ms.
  -m MAXDIRECTORYDEPTH, --max-depth=MAXDIRECTORYDEPTH
                        Max directory depth.
  -p, --enable-proxy    Enable proxy support.
  -S PROXYSERVER, --proxy-server=PROXYSERVER
                        Proxy server address.
  -P PROXYPORT, --proxy-port=PROXYPORT
                        Proxy server port.
  -f KBFILTER, --filter=KBFILTER
                        Comma separated ids of vulnerabilities to test,
                        default to all, use the --list-ids flag to enumerate
                        available ids.
  -I, --list-ids        Print a list of available ids in the knowledge base to
                        be used with the --filter flag.
  -k KBFILE, --kb=KBFILE
                        Knowledge base file to use, default kb.xml.
  -L MODULES, --load-modules=MODULES
                        Comma separated modules names to load or 'all' to load
                        them all, use the --list-modules flag to a list of
                        available modules.
  -M, --list-modules    Print a list of available modules.
  -u URL, --url=URL     Url to test, mandatory.
  -O OUTFILE, --output=OUTFILE
                        Output status and result to file.
  --import-files=IMPORTFILES
                        Import sensitive files list from this file.
  --import-dirs=IMPORTDIRS
                        Import sensitive directories list from this file.
  --single-mode         Single url mode, scan only this url for
                        vulnerabilities (the URL has to have at least one
                        parameter).


----------------------------------------------------------------------------------------

[evilsocket@shinigami altair] ./altair.py -I

[xss] Cross Site Scriptings :
A cross site scripting vulnerability, also known as XSS, is one of the most common vulnerabilities in web apps. The server does not check the users' input, and parses GET variables (can be done also through POST sometimes), without sanitizing them ahead of time. This allows users to inject html, javascript, or other code, through the page affected by this kind of bug. These injections occur client side (the server side code will be not modified), but the html stream that the user receives will contain the injected code . Usually this type of flaw is used to obtain private data such as cookies, data that often contains the credentials to access protected pages.

[sqli] SQL Injections :
An SQL injection, or SQL code injection, is another example of how a lack of checking user inputed data can undermine our site's security. Nowadays 90% of existing websites rely on a database to store contents such as news, articles, or simply to manage the users; this means that if not placed through an accurate checking process, the data send from an attacker can affect the information present in our database. An SQL injection, as the name itself suggests, is made by injecting arbitrary sql code in a variable sent to the website, both GET or POST, to obtain data from the db, data that would not be normally accessible .

[rfi] Remote File Inclusions :
A remote file inclusion happens when a page includes a file whose name is taken from a GET or POST variable that is not sanitized or checked ahead of time .

[lfi] Local File Inclusions :
A local file inclusion happens when a page includes a file whose name is taken from a GET or POST variable that is not sanitized or checked ahead of time .

[files] Sensitive Files :
Potential sensitive file .

[dirs] Sensitive Directories :
Potential sensitive directory .

----------------------------------------------------------------------------------------

[evilsocket@shinigami altair] altair -M

[+] 'lfier' by Simone Margaritelli <[email protected]> : This module will try to read some standard system files upon LFI vulnerabilities.
[+] 'sqlmap' by Simone Margaritelli <[email protected]> : This module will ask the user to launch sqlmap when a sql injection is found.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.