Vulnerability Scanning| Vulnerability Assessment| WEB Server| Golismero | Kali Linux
GoLismero is an open source framework for security testing. It’s currently geared towards web security, but it can easily be expanded to other kinds of scans.
Subscribe Me: https://www.youtube.com/channel/UCknKuPpCcqfcedsBhQm0NuA?sub_confirmation=1
The most interesting features of the framework are:
Real platform independence. Tested on Windows, Linux, *BSD and OS X.
No native library dependencies. All of the framework has been written in pure Python.
Good performance when compared with other frameworks written in Python and other scripting languages.
Very easy to use.
Plugin development is extremely simple.
The framework also collects and unifies the results of well known tools: sqlmap, xsser, openvas, dnsrecon, theharvester
Integration with standards: CWE, CVE and OWASP.
Designed for cluster deployment in mind (not available yet).
Source: https://github.com/golismero/golismero
usage: golismero.py COMMAND [TARGETS…] [–options]
SCAN:
Perform a vulnerability scan on the given targets. Optionally import
results from other tools and write a report. The arguments that follow may
be domain names, IP addresses or web pages.
PROFILES:
Show a list of available config profiles. This command takes no arguments.
PLUGINS:
Show a list of available plugins. This command takes no arguments.
INFO:
Show detailed information on a given plugin. The arguments that follow are
the plugin IDs. You can use glob-style wildcards.
REPORT:
Write a report from an earlier scan. This command takes no arguments.
To specify output files use the -o switch.
IMPORT:
Import results from other tools and optionally write a report, but don’t
scan the targets. This command takes no arguments. To specify input files
use the -i switch.
DUMP:
Dump the database from an earlier scan in SQL format. This command takes no
arguments. To specify output files use the -o switch.
UPDATE:
Update GoLismero to the latest version. Requires Git to be installed and
available in the PATH. This command takes no arguments.
examples:
scan a website and show the results on screen:
golismero.py scan http://www.example.com
grab Nmap results, scan all hosts found and write an HTML report:
golismero.py scan -i nmap_output.xml -o report.html
grab results from OpenVAS and show them on screen, but don’t scan anything:
golismero.py import -i openvas_output.xml
show a list of all available configuration profiles:
golismero.py profiles
show a list of all available plugins:
golismero.py plugins
show information on all bruteforcer plugins:
golismero.py info brute_*
dump the database from a previous scan:
golismero.py dump -db example.db -o dump.sql
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
My Other Related Videos:
”””””””””””””””””””””””””””””””””””””””””””””’
Whatsapp Sniffing | WhatsApp Penetration Testing
https://www.youtube.com/watch?v=2JQkh2BTK54
Kali 2017.1 Installation in vmware player
Kali 2017.1 Installation in Oracle VM virtualbox
Penetration Testing windows 7 using NSA Exploit (MS17-010) | Exploiting NSA Eternalblue
Penetration Testing windows 10 using Parrotsec Os | Exploiting window 10 with Metasploit framework
How to use Xerosploit in Kali linux
Parrot Security OS Installation
Security Auditing on linux | Vulnerability Analysis & Assessment on Kali linux
Penetration Testing Linux ftp server with Metasploit using Vsftpd Vulnerability
Penetration Testing Wi-fi wpa wpa2 Passwords using wifite
Penetration Testing Wi-Fi WPA/WPA2 without Dictionary and Brute Force Attack
https://www.youtube.com/watch?v=lS5NllKxhqA
Network Scanning in Windows using Angry IP Scanner:
Network Scanning in Kali using Angry IP Scanner:
Tor Browser Installation in kali:
If u like the video please Like the Video
if u have any doubt please comment on video…
for more education videos please subscribe the channel…
This video is only for education purpose ….
by Penetration Testing
linux web server