WebSploit Is an Open Source Project for Scan and Analysis Remote System from Vulnerability
Description:
- Autopwn – Used From Metasploit For Scan and Exploit Target Service
- wmap – Scan, Crawler Target Used From Metasploit wmap Plugin
- format infector – inject reverse & bind payload into file format
- phpmyadmin – Search Target phpmyadmin login page
- lfi – Scan, Bypass local file inclusion Vulnerability & can be bypass some WAF
- apache users – search server username directory (if use from apache webserver)
- Dir Bruter – brute target directory with wordlist
- admin finder – search admin & login page of target
- MLITM Attack – Man Left In The Middle, XSS Phishing Attacks
- MITM – Man In The Middle Attack
- Java Applet Attack – Java Signed Applet Attack
- MFOD Attack Vector – Middle Finger Of Doom Attack Vector
- USB Infection Attack – Create Executable Backdoor For Infect USB For Windows
How to Install WebSploit in Backtrack
First download WebSploit toolkit from here
Now unzip the file folder and copied WebSploit V.1.6 Toolkit in the directory web under pentest
Now change the permission of WebSploit file in WebSploit folder. Right click on websploit file and select properties
Select the Permission tab and click on Allow executing file as program and click on close
Now open your backtrack terminal and type
cd /pentest/web/websploit
./websploit