27.06.2013 Views

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

There are however tools that can scan, with this same method, all the known cgis that can be present<br />

on a web server: these are CGI vulnerability scanners. There are some on both Windows and Linux.<br />

For Windows, N-STEALTH is probably the best choice, as all is needed is to be given as an argument<br />

is the remote system's address in the host name:<br />

As for Whisker, it is a scanner that can be used on Linux in command line:<br />

./whisker -h host : simply scans the designated host<br />

Here are the other interesting options:<br />

-H : scan all hosts listed in a file<br />

-p : specify a port other than port 80<br />

-i : whisker tries to use the information already obtained<br />

-v : whisker displays all the information <strong>of</strong> the scan<br />

-l : log the results in a file<br />

-a : use <strong>of</strong> a login list if the server does not authorize a non authenticated access<br />

-p : use <strong>of</strong> a password list if the server does not authorize a non authenticated access<br />

The <strong>Hack</strong>ademy DMP -122/209- SYSDREAM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!