CURRENT functionality:
-S - stands for standard. a set of Standard tests and includes: indexing of directories testing, banner grabbing, language detection (should be obvious), robots.txt, 200 response testing (some servers send a 200 ok for every req), and thumbs.db scanning
-auth - looks for login pages with a list of some of the most common login files and dirs and admin consoles. don't need to be very big list of URLs because what else are going to name it? notAlogin.php???
-Cp - scan with a huge list of plugins dirs. the list is a bit old (Drupal and wordpress plugins databases are now current but sorry joomla's still a bit old)
-I - searches the responses for interesting strings
-Ws - looks for web services such as hosting provider, blogging services, favicon fingerprinting, and cms version info
-Fd - look for generally things people don't want you to see. The list is generated form a TON of robot.txt so whatever it finds should be interesting.
-ninja - A light weight and undetectable scan that uses bits and peaces from other scans
-R - use http range headers to make scans faster
-Shadow - Use Google cache instead of requesting from the target host
-Sd - Bruteforce Sub Domains
-Db - Bruteforce Directories with the big dirbuster Database
-Df - Scan for Apache default files
-d - Only Scan with this Directory
-np - don't do passive testes (less verbose)
-ua - use a custom UserAgent. PUT UA IN QUOTES if there's spaces
-proxy - send all http reqs via a proxy. example: 255.255.255.254:8080
-e - run all the scans in the tool
web-sorrow also has false positives checking on most of it's requests (it pretty accurate but not perfect)
basic: perl Wsorrow.pl -host scanme.nmap.org -S
stealthy: perl Wsorrow.pl -host scanme.nmap.org -ninja -proxy 190.145.74.10:3128
scan for login pages: perl Wsorrow.pl -host 192.168.1.1 -auth
CMS intense scan: perl Wsorrow.pl -host 192.168.1.1 -Ws -Cp all -I
most intense scan possible: perl Wsorrow.pl -host 192.168.1.1 -e
dump http headers: perl headerDump.pl
Check if host is alive: perl hdt.pl -host 192.168.1.1
fixed 2 bugs and minor changes (FYI: the "B" does not mean it's in beta)
Web-Sorrow_1.4.7B.zip
you need to install perl for running web-sorrow on linux.
If you are running on windows machine then
Download Perl from
http://strawberryperl.com/
Web-Sorrow_v1.4.5.zip
read more in here : http://code.google.com/p/web-sorrow/
read more in here : http://code.google.com/p/web-sorrow/
you need to install perl for running web-sorrow on linux.
If you are running on windows machine then
Download Perl from
http://strawberryperl.com/
our previous post on web sorrow-
http://santoshdudhade.blogspot.in/2012/06/web-sorrow-v-138-remote-security.html
http://santoshdudhade.blogspot.in/2012/06/update-web-sorrow-v-139-remote-web.html
http://santoshdudhade.blogspot.in/2012/05/web-sorrow-remote-web-scanner-for.html
http://santoshdudhade.blogspot.in/2012/06/web-sorrow-v140-remote-security-scanner.html
http://santoshdudhade.blogspot.in/2012/06/web-sorrow-v-138-remote-security.html
http://santoshdudhade.blogspot.in/2012/06/update-web-sorrow-v-139-remote-web.html
http://santoshdudhade.blogspot.in/2012/05/web-sorrow-remote-web-scanner-for.html
http://santoshdudhade.blogspot.in/2012/06/web-sorrow-v140-remote-security-scanner.html
http://santoshdudhade.blogspot.in/2012/06/web-sorrow-v141-remote-security-scanner.html
http://santoshdudhade.blogspot.com/2012/07/web-sorrow-v142-remote-security-scanner.html
Source -
http://code.google.com/p/web-sorrow/
Snapshot -
http://santoshdudhade.blogspot.com/2012/07/web-sorrow-v142-remote-security-scanner.html
Source -
http://code.google.com/p/web-sorrow/
Snapshot -
Post a Comment