Kali Linux: Scan Vulnerability using Grabber (en)
Revision as of 05:52, 4 January 2025 by Onnowpurbo (talk | contribs) (Created page with "Grabber is a web application scanner. It primarily detects various types of vulnerabilities on your site. Grabber is simple, not fast but portable and very easy to adapt. This...")
Grabber is a web application scanner. It primarily detects various types of vulnerabilities on your site. Grabber is simple, not fast but portable and very easy to adapt. This software is designed to scan small websites like personal sites, forums, etc. Applications that are really not large: it would take too long and flood your network.
Features:
- Cross-Site Scripting (XSS)
- SQL Injection (there is also a special module for Blind SQL Injection)
- File Inclusion
- Backup file check
- Simple AJAX check (parses each JavaScript and obtains URLs and tries to get their parameters)
- Hybrid analysis/Crystal ball testing for PHP applications using PHP-SAT
- JavaScript source code analyzer: Evaluation of the quality/correctness of JavaScript with JavaScript Lint
- Creates [session_id, time(t)] files for further stats analysis.
Grabber Commands
grabber -h Usage: grabber.py [options] Options: -h, --help show this help message and exit -u ARCHIVES_URL, --url=ARCHIVES_URL Address to investigate -s, --sql Look for SQL Injection -x, --xss Perform XSS attacks -b, --bsql Look for blind SQL Injection -z, --backup Look for backup files -d SPIDER, --spider=SPIDER Look for every file -i, --include Perform File Insertion attacks -j, --javascript Test the javascript code? -c, --crystal Simple crystal ball test. -e, --session Session evaluations
Grabber Usage Example
Spider web application to depth 2 (–spider 2), check for SQLi (--sql), XSS (--xss), and blind SQLi (--bsql) attack for URL (--url http://192.168.0.100/DVWA-1.9/):
grabber --spider 2 --sql --xss --bsql --url http://192.168.0.100/DVWA-1.9/ Start scanning... http://192.168.0.100/DVWA-1.9/ runSpiderScan @ http://192.168.0.100/DVWA-1.9/ | # 2 runSpiderScan @ http://192.168.0.100/DVWA-1.9/ | # 1 runSpiderScan @ http://192.168.0.100/DVWA-1.9/ | # 0 Start investigation... Method = GET http://192.168.0.100/DVWA-1.9/ [Cookie] 0 : <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/> [Cookie] 1 : <Cookie security=impossible for 192.168.0.100/DVWA-1.9>
Method = GET http://192.168.0.100/DVWA-1.9/
[Cookie] 0 : <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/> [Cookie] 1 : <Cookie security=impossible for 192.168.0.100/DVWA-1.9>
Method = GET http://192.168.0.100/DVWA-1.9/
[Cookie] 0 : <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/> [Cookie] 1 : <Cookie security=impossible for 192.168.0.100/DVWA-1