Uniscan On Backtrack




Hello Friends, In this post I will show how to use 'uniscan' a small but powerful web-vulnerability scanner on Backtrack
If you do-not have 'uniscan', you can install it by typing 'apt-get install uniscan'
Steps:
root@bt:~# locate uniscan
/pentest/web/uniscan
[Outputs ommited]
'locate' command used to find the directory path to 'uniscan'
root@bt:~# cd /pentest/web/uniscan/
root@bt:/pentest/web/uniscan# ./uniscan.pl
###############################
# Uniscan project #
# http://www.uniscan.com.br/ #
###############################
V. 5.3
New version 5.4 is avaliable
More details in http://www.uniscan.com.br/
OPTIONS:
-h help
-u <url> example: https://www.example.com/
-f <file> list of url's
-b Uniscan go to background
-q Enable Directory checks
-w Enable File checks
-e Enable robots.txt check
-d Enable Dynamic checks
-s Enable Static checks
-r Enable Stress checks
-i <dork> Bing search
usage:
[1] perl ./uniscan.pl -u http://www.example.com/ -qweds
[2] perl ./uniscan.pl -f sites.txt -bqweds
[3] perl ./uniscan.pl -i uniscan
[4] perl ./uniscan.pl -i "ip:xxx.xxx.xxx.xxx"
[5] perl ./uniscan.pl -u https://www.example.com/ -r
Now if you have a Target Address or IP, the simplest way to scan is:
root@bt:/pentest/web/uniscan# ./uniscan.pl -u http://target.com/ -qedws
The keys are defined in the options..

This scan takes sometimes, once the scanning is done, it will automatically reveal the vulnerabilities found.
Thats all for this post.
Stay Tuned For More.
Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
If you do-not have 'uniscan', you can install it by typing 'apt-get install uniscan'
Steps:
root@bt:~# locate uniscan
/pentest/web/uniscan
[Outputs ommited]
'locate' command used to find the directory path to 'uniscan'
root@bt:~# cd /pentest/web/uniscan/
root@bt:/pentest/web/uniscan# ./uniscan.pl
###############################
# Uniscan project #
# http://www.uniscan.com.br/ #
###############################
V. 5.3
New version 5.4 is avaliable
More details in http://www.uniscan.com.br/
OPTIONS:
-h help
-u <url> example: https://www.example.com/
-f <file> list of url's
-b Uniscan go to background
-q Enable Directory checks
-w Enable File checks
-e Enable robots.txt check
-d Enable Dynamic checks
-s Enable Static checks
-r Enable Stress checks
-i <dork> Bing search
usage:
[1] perl ./uniscan.pl -u http://www.example.com/ -qweds
[2] perl ./uniscan.pl -f sites.txt -bqweds
[3] perl ./uniscan.pl -i uniscan
[4] perl ./uniscan.pl -i "ip:xxx.xxx.xxx.xxx"
[5] perl ./uniscan.pl -u https://www.example.com/ -r
Now if you have a Target Address or IP, the simplest way to scan is:
root@bt:/pentest/web/uniscan# ./uniscan.pl -u http://target.com/ -qedws
The keys are defined in the options..

This scan takes sometimes, once the scanning is done, it will automatically reveal the vulnerabilities found.
Thats all for this post.
Stay Tuned For More.
Feel Free To Leave A Comment If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!
0 comments: