File: websploit.1

package info (click to toggle)
websploit 3.0.0-1
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 3,248 kB
  • ctags: 126
  • sloc: python: 231,477; ruby: 412; php: 20; makefile: 2
file content (81 lines) | stat: -rw-r--r-- 2,201 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
.TH WEBSPLOIT 1
.SH NAME
websploit \- Advanced MITM Framework 
.SH SYNOPSIS
.B websploit
.br
.SH DESCRIPTION
.PP
Websploit is an automatic vulnerability assessment, web scanner and exploiter tool. It is python command line tool that is composed on modular structure pretty similar to Metasploit. There are currently 20 modules into four sections.
The command line does not accept any options. User just get into console typing "websploit" and the prompt will change to this:
wsf >

.SH OPTIONS
.TP
.B wsf > help
Shows all command you can type in the websploit console. Some of them are only aplicable when using a certain module.
.TP
.B wsf > show modules
Show Modules of Current Database
.TP
.B wsf > use <module_name>
Select Module For Use
.TP
.B  wsf > show options
Show Current Options Of Selected Module
.TP
.B  wsf > set <module_option>
Once you had seen the options of the selected module, you may use this command to define its desired value.
.TP
.B wsf > scan
Scan Wifi (Wireless Modules)
.TP
.B wsf > stop
Stop Attack & Scan (Wireless Modules) 
.TP
.B wsf > run
Execute Module
.TP
.B wsf > os
Run console commands (ex : os ifconfig)
.TP
.B wsf > back
Exit current module
.TP
.B wsf > upgrade | update
Both of them are disabled on Debian systems in order to avoid conflicts with apt-get.
.TP
.B wsf > about
Shows info about the author.

.SH EXAMPLES
.TP
Here is a simple example on how to use apache_users module in order to hunt existing Apache users directories.
.nf
sf > use web/apache_users
wsf:Apache User > show options

 Options         Value 
-----------     ----------------
URL             http://example.com 

wsf:Apache User > set url myown.example.org
URL =>  myown.example.org
wsf:Apache User > run
[*] Your Target : myown.example.org
[*]Loading Path List ... Please Wait ...
[~root] ... [400 Bad Request]
[~toor] ... [400 Bad Request]
[~bin] ... [400 Bad Request]
[~daemon] ... [400 Bad Request]
[~adm] ... [400 Bad Request]
[~lp] ... [400 Bad Request]
[~sync] ... [400 Bad Request]
etc
.fi
.SH AUTHOR
.PP
Fardin Allahverdinazhand <0x0ptim0us@Gmail.com>
.PP
This manual page was written by Marcos Fouces <mfouces@yahoo.es>, for the Debian project (and may be used by others).