Uniscan On Backtrack

Hello Friends, In this post I will show how to use 'uniscan' a small but powerful web-vulnerability scanner on Backtrack

If you do-not have 'uniscan', you can install it by typing 'apt-get install uniscan'

Steps:

root@bt:~# locate uniscan
/pentest/web/uniscan
[Outputs ommited]

'locate' command used to find the directory path to 'uniscan'
root@bt:~# cd /pentest/web/uniscan/
root@bt:/pentest/web/uniscan# ./uniscan.pl

###############################
# Uniscan project             #
# http://www.uniscan.com.br/  #
###############################
V. 5.3


New version 5.4 is avaliable                                                     
More details in http://www.uniscan.com.br/

                                     
OPTIONS:
        -h      help
        -u      <url> example: https://www.example.com/
        -f      <file> list of url's
        -b      Uniscan go to background
        -q      Enable Directory checks
        -w      Enable File checks
        -e      Enable robots.txt check
        -d      Enable Dynamic checks
        -s      Enable Static checks
        -r      Enable Stress checks
        -i      <dork> Bing search

usage:
[1] perl ./uniscan.pl -u http://www.example.com/ -qweds
[2] perl ./uniscan.pl -f sites.txt -bqweds
[3] perl ./uniscan.pl -i uniscan
[4] perl ./uniscan.pl -i "ip:xxx.xxx.xxx.xxx"
[5] perl ./uniscan.pl -u https://www.example.com/ -r


Now if you have a Target Address or IP, the simplest way to scan is:
root@bt:/pentest/web/uniscan# ./uniscan.pl -u http://target.com/ -qedws

The keys are defined in the options..



This scan takes sometimes, once the scanning is done, it will automatically reveal the vulnerabilities found.

Thats all for this post.

Stay Tuned For More.

Feel Free To Leave A Comment
If Our Article has Helped You, Support Us By Making A Small Contribution, Thank You!


0 comments: