Difference between revisions of "Nuclei: Run"

From OnnoWiki
Jump to navigation Jump to search
 
(2 intermediate revisions by the same user not shown)
Line 9: Line 9:
 
Nama folder di bawahnya adalah
 
Nama folder di bawahnya adalah
  
  cves            exposed-panels  fuzzing    miscellaneous    takeovers        workflows
+
  cves            exposed-panels  fuzzing    miscellaneous    takeovers         
 
  default-logins  exposed-tokens  helpers    misconfiguration  technologies
 
  default-logins  exposed-tokens  helpers    misconfiguration  technologies
 
  dns            exposures      LICENSE.md  README.md        vulnerabilities
 
  dns            exposures      LICENSE.md  README.md        vulnerabilities
 
+
workflows
 
 
  
 
==Run Single==
 
==Run Single==
  
 
  nuclei -l urls.txt -t files/git-core.yaml -o results.txt
 
  nuclei -l urls.txt -t files/git-core.yaml -o results.txt
 +
nuclei -l urls.txt -t vulnerabilities/generic/basic-xss-prober.yaml -o results.txt
 +
  
 
Contoh Isi urls.txt
 
Contoh Isi urls.txt
Line 25: Line 26:
 
  https://test.com
 
  https://test.com
 
  http://192.168.88.184/
 
  http://192.168.88.184/
 +
http://192.168.88.184/DVWA-1.9/
  
 
==Run Multi==
 
==Run Multi==
  
  nuclei -l urls.txt -t cves/ -t files/ -o results.txt
+
  nuclei -l urls.txt -t cves/ -t vulnerabilities/ -o results.txt

Latest revision as of 20:22, 22 January 2021

Download Templates

nuclei -update-templates

Template akan tersimpan di

~/nuclei-templates

Nama folder di bawahnya adalah

cves            exposed-panels  fuzzing     miscellaneous     takeovers        
default-logins  exposed-tokens  helpers     misconfiguration  technologies
dns             exposures       LICENSE.md  README.md         vulnerabilities
workflows

Run Single

nuclei -l urls.txt -t files/git-core.yaml -o results.txt
nuclei -l urls.txt -t vulnerabilities/generic/basic-xss-prober.yaml -o results.txt


Contoh Isi urls.txt

https://test.some-site.com
http://vuls-testing.com
https://test.com
http://192.168.88.184/
http://192.168.88.184/DVWA-1.9/

Run Multi

nuclei -l urls.txt -t cves/ -t vulnerabilities/ -o results.txt