VULNERABILITY: Grabber: Scan Vulnerability (en)
Revision as of 15:36, 6 January 2025 by Onnowpurbo (talk | contribs) (Created page with "Grabber is a web application scanner that detects various types of vulnerabilities on your site. Grabber is simple, not fast but portable, and very adaptable. This software is...")
Grabber is a web application scanner that detects various types of vulnerabilities on your site. Grabber is simple, not fast but portable, and very adaptable. This software is designed to scan small websites like personal, forums, etc. It is not meant for very large applications: it would take too long and could flood your network.
Features:
- Cross-Site Scripting (XSS)
- SQL Injection (with a special module for Blind SQL Injection)
- File Inclusion
- Backup file check
- Simple AJAX check (parses each JavaScript and obtains URLs and tries to obtain their parameters)
- Hybrid analysis/Crystal ball testing for PHP applications using PHP-SAT
- JavaScript source code analyzer: Evaluation of the quality/correctness of JavaScript with JavaScript Lint
- Creates [session_id, time(t)] files for further stats analysis.
Grabber Commands
grabber -h
Usage: grabber.py [options] Options: -h, --help show this help message and exit -u ARCHIVES_URL, --url=ARCHIVES_URL Address to investigate -s, --sql Look for SQL Injection -x, --xss Perform XSS attacks -b, --bsql Look for blind SQL Injection -z, --backup Look for backup files -d SPIDER, --spider=SPIDER Look for every file -i, --include Perform File Insertion attacks -j, --javascript Test the JavaScript code? -c, --crystal Simple crystal ball test. -e, --session Session evaluations
Usage Example of Grabber
Spider web application to a depth of 2 (--spider 2), check for SQLi (--sql), XSS (--xss), and blind SQLi (--bsql) attacks on URL (--url http://192.168.0.100/DVWA-1.9/):
grabber --spider 2 --sql --xss --bsql --url http://192.168.0.100/DVWA-1.9/ Start scanning... http://192.168.0.100/DVWA-1.9/ runSpiderScan @ http://192.168.0.100/DVWA-1.9/ | # 2 runSpiderScan @ http://192.168.0.100/DVWA-1.9/ | # 1 runSpiderScan @ http://192.168.0.100/DVWA-1.9/ | # 0 Start investigation... Method = GET http://192.168.0.100/DVWA-1.9/ [Cookie] 0 : <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/> [Cookie] 1 : <Cookie security=impossible for 192.168.0.100/DVWA-1.9> Method = GET http://192.168.0.100/DVWA-1.9/ [Cookie] 0 : <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/> [Cookie] 1 : <Cookie security=impossible for 192.168.0.100/DVWA-1.9> Method = GET http://192.168.0.100/DVWA-1.9/ [Cookie] 0 : <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/> [Cookie] 1 : <Cookie security=impossible for 192.168.0.100/DVWA-1.9>