File: websploit.1

package info (click to toggle)
websploit 4.0.4-3
  • links: PTS, VCS
  • area: main
  • in suites: bookworm, forky, sid, trixie
  • size: 200 kB
  • sloc: python: 672; makefile: 9
file content (53 lines) | stat: -rw-r--r-- 1,633 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
.TH WEBSPLOIT 1
.SH NAME
websploit \- Advanced MITM Framework 
.SH SYNOPSIS
.B websploit
.br
.SH DESCRIPTION
.PP
Websploit is an automatic vulnerability assessment, web scanner and exploiter tool. It is python command line tool that is composed on modular structure pretty similar to Metasploit. There are currently 7 modules.
The command line does not accept any options. User just get into console typing "websploit" as root and the prompt will change to this:
wsf >

.SH OPTIONS
.TP
.B wsf > help
Shows all command you can type in the websploit console. Some of them are only aplicable when using a certain module.
.TP
.B wsf > show
Show Modules of Current Database
.TP
.B wsf > use <module_name>
Select Module For Use
.TP
.B  wsf > options
Show Current Options Of Selected Module
.TP
.B  wsf > set <module_option>
Once you had seen the options of the selected module, you may use this command to define its desired value.
.TP
.B wsf > back
Exit current module
.TP
.B wsf > update
Disabled on Debian systems in order to avoid conflicts with apt-get.
.TP
.B wsf > about
Shows info about the author.

.SH EXAMPLES
.TP
Here is a simple example on how to use scan_wifi module in order to hunt existing wifi networks.
.PP
$wsf > scan_wifi > execute
.TS
l l l l l l .
\fBSSID	BSSID	CHANNEL	SIGNAL	BARS	SECURITY\fR
EDTSTAR_2350	1C-B0-44-38-98-49	11	89	▂▄▆█	WPA2
JAZZTWE_aJpE	00-4A-77-4D-C4-CC	1	69	▂▄▆_	WPA1 WPA2
RadioPatioA1985	74-9D-79-2A-47-60	11	57	▂▄▆_	WPA2
MIWIFI_dsTp	EC-BE-ED-39-1A-D2	1	44	▂▄__	WPA2
DabaduNet4434	78-84-B4-51-44-35	8	44	▂▄__	WPA2
MyHomenet821	74-7D-79-52-2A-00	1	37	▂▄__	WPA2
.TE