Linux serverlinux web serverNETWORK ADMINISTRATIONS

Vulnerability Scanning| Vulnerability Assessment| WEB Server| Golismero | Kali Linux

GoLismero is an open source framework for security testing. It’s currently geared towards web security, but it can easily be expanded to other kinds of scans.

Subscribe Me: https://www.youtube.com/channel/UCknKuPpCcqfcedsBhQm0NuA?sub_confirmation=1

The most interesting features of the framework are:

Real platform independence. Tested on Windows, Linux, *BSD and OS X.
No native library dependencies. All of the framework has been written in pure Python.
Good performance when compared with other frameworks written in Python and other scripting languages.
Very easy to use.
Plugin development is extremely simple.
The framework also collects and unifies the results of well known tools: sqlmap, xsser, openvas, dnsrecon, theharvester
Integration with standards: CWE, CVE and OWASP.
Designed for cluster deployment in mind (not available yet).

Source: https://github.com/golismero/golismero

usage: golismero.py COMMAND [TARGETS…] [–options]

SCAN:
Perform a vulnerability scan on the given targets. Optionally import
results from other tools and write a report. The arguments that follow may
be domain names, IP addresses or web pages.

PROFILES:
Show a list of available config profiles. This command takes no arguments.

PLUGINS:
Show a list of available plugins. This command takes no arguments.

INFO:
Show detailed information on a given plugin. The arguments that follow are
the plugin IDs. You can use glob-style wildcards.

REPORT:
Write a report from an earlier scan. This command takes no arguments.
To specify output files use the -o switch.

IMPORT:
Import results from other tools and optionally write a report, but don’t
scan the targets. This command takes no arguments. To specify input files
use the -i switch.

DUMP:
Dump the database from an earlier scan in SQL format. This command takes no
arguments. To specify output files use the -o switch.

UPDATE:
Update GoLismero to the latest version. Requires Git to be installed and
available in the PATH. This command takes no arguments.

examples:

scan a website and show the results on screen:
golismero.py scan http://www.example.com

grab Nmap results, scan all hosts found and write an HTML report:
golismero.py scan -i nmap_output.xml -o report.html

grab results from OpenVAS and show them on screen, but don’t scan anything:
golismero.py import -i openvas_output.xml

show a list of all available configuration profiles:
golismero.py profiles

show a list of all available plugins:
golismero.py plugins

show information on all bruteforcer plugins:
golismero.py info brute_*

dump the database from a previous scan:
golismero.py dump -db example.db -o dump.sql

,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
My Other Related Videos:
”””””””””””””””””””””””””””””””””””””””””””””’

Whatsapp Sniffing | WhatsApp Penetration Testing
https://www.youtube.com/watch?v=2JQkh2BTK54

Kali 2017.1 Installation in vmware player

Kali 2017.1 Installation in Oracle VM virtualbox

Penetration Testing windows 7 using NSA Exploit (MS17-010) | Exploiting NSA Eternalblue

Penetration Testing windows 10 using Parrotsec Os | Exploiting window 10 with Metasploit framework

How to use Xerosploit in Kali linux

Parrot Security OS Installation

Security Auditing on linux | Vulnerability Analysis & Assessment on Kali linux

Penetration Testing Linux ftp server with Metasploit using Vsftpd Vulnerability

Penetration Testing Wi-fi wpa wpa2 Passwords using wifite

Penetration Testing Wi-Fi WPA/WPA2 without Dictionary and Brute Force Attack
https://www.youtube.com/watch?v=lS5NllKxhqA

Network Scanning in Windows using Angry IP Scanner:

Network Scanning in Kali using Angry IP Scanner:

Tor Browser Installation in kali:

If u like the video please Like the Video
if u have any doubt please comment on video…
for more education videos please subscribe the channel…
This video is only for education purpose ….

source

by Penetration Testing

linux web server

Leave a Reply

Your email address will not be published. Required fields are marked *