search
HomeOperation and MaintenanceSafetyHow to analyze the application of automated web penetration testing framework

About Vajar

Vajra is an automated web penetration testing framework that helps security researchers automate boring reconnaissance tasks and the same scan against multiple targets during web application penetration testing. Vajra is highly customizable, allowing researchers to customize the scanning scope. We do not need to perform all scans on the target. We can choose the scanning tasks to be performed according to our own needs, which can minimize unnecessary communication traffic and Output the scan results to CouchDB.

Vajra uses the most common open source tools, which are some tools that many security researchers use when conducting security testing. Vajra completes all tasks through a web browser and provides an easy-to-use user interface and a beginner-friendly functional framework.

How to analyze the application of automated web penetration testing framework

As we all know, analyzing data from scan results is very important in the process of penetration testing. Only when you can visualize your data in an appropriate way can we Will try to find as much valuable information as possible.

Currently, Vajra’s developers have added 27 unique bug bounty program features, with more support to be added later.

Core functions

Can perform highly targeted scans;

Run multiple scan tasks in parallel;

Can highly customize scans according to user requirements Tasks;

Absolutely beginner-friendly Web UI;

Fast scanning (asynchronous scanning);

Export results in CSV format or copy directly to clipboard

Telegram notification support;

What can Vajra do?

Subdomain scanning using IP, status code and header;

Subdomain takeover scanning;

Port scanning;

Host discovery;

Host parameter scanning;

7x24 hours subdomain monitoring;

7x24 hours JavaScript monitoring;

Use Nuclei to perform template scanning;

Fuzz test endpoints to discover hidden nodes or critical files (e.g. .env);

Extract JavaScript;

Use a custom generated dictionary for fuzz testing;

Extract sensitive data such as API keys and hidden JavaScript;

Detect invalid links;

Filter nodes based on extensions;

Favicon hash;

GitHub Dork;

CORS scanning;

CRLF scanning;

403 bypass;

Find hidden parameters;

Google Hacking;

Shodan search query;

Extract hidden nodes from JavaScript;

Create target-based custom word lists;

Vulnerability scanning;

CVE scan;

CouchDB stores all scan output results;

Tool manual installation

$ git clone --recursive https://github.com/r3curs1v3-pr0xy/vajra.git

# sudo su (root access is required)

# cd vajra/tools/ && chmod +x *

# cd ../

# nano .env  (Update username, password, and JWT Secret)

# cd ./install

# chmod +x ./install.sh

# ./install.sh

Use Docker-Compose to run

First , we need to use the following command to clone the project source code locally:

git clone --recursive https://github.com/r3curs1v3-pr0xy/vajra.git

Next, modify the configuration file, add API tokens, etc. Then run the following command:

docker-compose up

If you want to modify and update the file, you need to run the following command again:

docker-compose build

docker-compose up

Tool usage example

Complete Scan:

How to analyze the application of automated web penetration testing framework

Scan result:

How to analyze the application of automated web penetration testing framework

Subdomain name scan :

How to analyze the application of automated web penetration testing framework

Subdomain name monitoring:

How to analyze the application of automated web penetration testing framework

The above is the detailed content of How to analyze the application of automated web penetration testing framework. For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:亿速云. If there is any infringement, please contact admin@php.cn delete

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software