VULNERABILITY: Grabber: Scan Vulnerability (en)

From OnnoWiki
Revision as of 15:36, 6 January 2025 by Onnowpurbo (talk | contribs) (Created page with "Grabber is a web application scanner that detects various types of vulnerabilities on your site. Grabber is simple, not fast but portable, and very adaptable. This software is...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Grabber is a web application scanner that detects various types of vulnerabilities on your site. Grabber is simple, not fast but portable, and very adaptable. This software is designed to scan small websites like personal, forums, etc. It is not meant for very large applications: it would take too long and could flood your network.

Features:

  • Cross-Site Scripting (XSS)
  • SQL Injection (with a special module for Blind SQL Injection)
  • File Inclusion
  • Backup file check
  • Simple AJAX check (parses each JavaScript and obtains URLs and tries to obtain their parameters)
  • Hybrid analysis/Crystal ball testing for PHP applications using PHP-SAT
  • JavaScript source code analyzer: Evaluation of the quality/correctness of JavaScript with JavaScript Lint
  • Creates [session_id, time(t)] files for further stats analysis.

Grabber Commands

grabber -h
Usage: grabber.py [options]

Options:
  -h, --help            show this help message and exit
  -u ARCHIVES_URL, --url=ARCHIVES_URL
                        Address to investigate
  -s, --sql             Look for SQL Injection
  -x, --xss             Perform XSS attacks
  -b, --bsql            Look for blind SQL Injection
  -z, --backup          Look for backup files
  -d SPIDER, --spider=SPIDER
                        Look for every file
  -i, --include         Perform File Insertion attacks
  -j, --javascript      Test the JavaScript code?
  -c, --crystal         Simple crystal ball test.
  -e, --session         Session evaluations

Usage Example of Grabber

Spider web application to a depth of 2 (--spider 2), check for SQLi (--sql), XSS (--xss), and blind SQLi (--bsql) attacks on URL (--url http://192.168.0.100/DVWA-1.9/):

grabber --spider 2 --sql --xss --bsql --url http://192.168.0.100/DVWA-1.9/

Start scanning... http://192.168.0.100/DVWA-1.9/
runSpiderScan @  http://192.168.0.100/DVWA-1.9/  |   # 2
runSpiderScan @  http://192.168.0.100/DVWA-1.9/  |   # 1
runSpiderScan @  http://192.168.0.100/DVWA-1.9/  |   # 0
Start investigation...
Method = GET  http://192.168.0.100/DVWA-1.9/
[Cookie]  0  :  <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/>
[Cookie]  1  :  <Cookie security=impossible for 192.168.0.100/DVWA-1.9>
Method = GET  http://192.168.0.100/DVWA-1.9/
[Cookie]  0  :  <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/>
[Cookie]  1  :  <Cookie security=impossible for 192.168.0.100/DVWA-1.9>
Method = GET  http://192.168.0.100/DVWA-1.9/
[Cookie]  0  :  <Cookie PHPSESSID=hade33r413l7b65c8tkcmnpod2 for 192.168.0.100/>
[Cookie]  1  :  <Cookie security=impossible for 192.168.0.100/DVWA-1.9>

References