Unconfigured Ad Widget

Collapse

Anúncio

Collapse
No announcement yet.

Scan joomla

Collapse
X
 
  • Filter
  • Tempo
  • Show
Clear All
new posts

  • Font Size
    #1

    Tools Scan joomla

    Um scan em perl para procurar falhas no joomla
    para utilizar e simples
    Iniciar>executar>cmd>cd..>cd..>cd perl/bin>perl joomscan.pl
    podendo usar as seguintes strings

    Usage: joomscan.pl -u <string> -x proxyort
    -u <string> = joomla Url

    ==Optional==

    -x <string:int> = proXy to tunnel
    -c <string> = Cookie (name=value
    -g "<string>" = desired useraGent string(within ")
    -nv = No Version fingerprinting check
    -nf = No Firewall detection check
    -nvf/-nfv = No version+firewall check
    -pe = Poke version only and Exit
    -ot = Output to Text file (target-joexploit.txt)
    -oh = Output to Html file (target-joexploit.htm)
    -vu = Verbose (output every Url scan)
    -sp = Show completed Percentage

    Exemplo: perl joomscan.pl -u Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...


    Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...

    senha: Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...
    -------------------------------------------------------------------------------------------







  • Font Size
    #2
    Showw

    Ja estou salvando.

    Otima Contribuição.

    Comment


    • Font Size
      #3
      para utilizar e simples
      Iniciar>executar>cmd>cd..>cd..>cd perl/bin>perl joomscan.pl
      Para Fazer esse comando o scan precisa estar salvo dentro da pasta bin.

      Voce pode salvar o scan no desktop e dar os seguinte comandos Iniciar>executar>cmd>cd desktop>perl joomscan.pl e pronto , é só o caminho que mudou ! rsrs
      flw
      Nao Participa ainda ?
      * Comunidade Elite Defacer


      Elite Defacer
      Hackeralp - 5ubZer0 - $cr34m()

      Comment


      • Font Size
        #4
        Obrigado. Muito util

        Comment


        • Font Size
          #5
          Nao consigo, alguem me ajude:

          - executo o cmd
          - cd ambiente de trabalho
          - perl joomscan.pl -> resposta: "perl" não é reconhecido como um comando externo ou interno........


          O que fiz de errado?

          Comment


          • Font Size
            #6
            vc tem o active perl instalado? se nao tiver instale
            -------------------------------------------------------------------------------------------






            Comment


            • Font Size
              #7
              Agora ja aceita, mas quando meto "perl joomscan.pl", diz:
              Can't Open perl script joomscan.pl: no such file or directory

              Comment


              • Font Size
                #8
                bom post mam
                sigpic

                Comment


                • Font Size
                  #9
                  Preciso de ajuda.
                  Algum comando que executei mal.
                  Tenho de por algum ficheiro no desktop para poder fazer o comando?

                  Comment


                  • Font Size
                    #10
                    Ja consegui.

                    Disse-me que um site era vulneravel no primeiro ponto, agora como sei como explorar essa vulnerabilidade?

                    Comment


                    • Font Size
                      #11
                      Can't open perl script "joomscan.pl": No such file or directory
                      oq faço agora ?

                      Comment


                      • Font Size
                        #12
                        é possivel explorar algo?
                        Server: Apache/2.0.59 (Unix) DAV/2
                        X-Powered-By: PHP/5.1.5


                        ## NOTE: The Administrator URL was renamed. Bruteforce it. ##
                        ## None of /administrator, /admin, /manage ##


                        ## Checking if the target has deployed an Anti-Scanner measure

                        [!] Scanning Passed ..... OK


                        ## Detecting Joomla! based Firewall ...

                        [!] .htaccess shipped with Joomla! is being deployed for SEO purpose
                        [!] It contains some defensive mod_rewrite rules
                        [!] Payloads that contain strings (mosConfig,base64_encode,<script>
                        GLOBALS,_REQUEST) wil be responsed with 403.


                        ## Fingerprinting in progress ...

                        ~Generic version family ....... [1.5.x]


                        * Deduced version range is : [1.5.? - 1.5.?]

                        ## Fingerprinting done.


                        ## 7 Components Found in front page ##

                        com_ninjarsssyndicator com_content
                        com_dtregister com_jevents com_docman
                        com_weblinks com_comprofiler




                        Vulnerabilities Discovered
                        ==========================

                        # 1
                        Info -> Core: Multiple XSS/CSRF Vulnerability
                        Versions Affected: 1.5.9 <=
                        Check: /?1.5.9-x
                        Exploit: A series of XSS and CSRF faults exist in the administrator application.
                        Affected administrator components include com_admin, com_media, com_search. B
                        oth com_admin and com_search contain XSS vulnerabilities, and com_media contains
                        2 CSRF vulnerabilities.
                        Vulnerable? N/A

                        # 2
                        Info -> Core: JSession SSL Session Disclosure Vulnerability
                        Versions effected: Joomla! 1.5.8 <=
                        Check: /?1.5.8-x
                        Exploit: When running a site under SSL (the entire site is forced to be under ss
                        l), Joomla! does not set the SSL flag on the cookie. This can allow someone mon
                        itoring the network to find the cookie related to the session.
                        Vulnerable? N/A

                        # 3
                        Info -> Core: Frontend XSS Vulnerability
                        Versions effected: 1.5.10 <=
                        Check: /?1.5.10-x
                        Exploit: Some values were output from the database without being properly escape
                        d. Most strings in question were sourced from the administrator panel. Maliciou
                        s normal admin can leverage it to gain access to super admin.
                        Vulnerable? N/A

                        # 4
                        Info -> Core: Frontend XSS - HTTP_REFERER not properly filtered Vulnerability
                        Versions effected: 1.5.11 <=
                        Check: /?1.5.11-x-http_ref
                        Exploit: An attacker can inject JavaScript or DHTML code that will be executed i
                        n the context of targeted user browser, allowing the attacker to steal cookies.
                        HTTP_REFERER variable is not properly parsed.
                        Vulnerable? N/A

                        # 5
                        Info -> Core: Frontend XSS - PHP_SELF not properly filtered Vulnerability
                        Versions effected: 1.5.11 <=
                        Check: /?1.5.11-x-php-s3lf
                        Exploit: An attacker can inject JavaScript code in a URL that will be executed i
                        n the context of targeted user browser.
                        Vulnerable? N/A

                        # 6
                        Info -> Core: Path Disclosure Vulnerability
                        Versions effected: Joomla! 1.5.3 <=
                        Check: /?1.5.3-path-disclose
                        Exploit: Crafted URL can disclose absolute path
                        Vulnerable? N/A

                        # 7
                        Info -> Core: User redirected Spamming Vulnerability
                        Versions effected: Joomla! 1.5.3 <=
                        Check: /?1.5.3-spam
                        Exploit: User redirect spam
                        Vulnerable? N/A

                        Terminating on signal SIGINT(2)

                        Comment


                        • Font Size
                          #13
                          Olá,

                          Poderiam me ajudar?

                          Instalei o Active Perl, enviei os arquivos do Joomscan para a pasta C:/Perl/bin, abri a janela de comandos (cmd), fui até a pasta onde está o arquivo "joomscam.pl" (C:/Perl/bin) e dei o comando "perl joomscan.pl"...mas dá esta mensagem:

                          Can't locate Switch.pm in @INC <@INC contains: C:/Perl/site/lib C:/Perl/lib .> at joomscan.pl line 22.
                          BEGIN failed--compilation aborted at joomscan.pl line 22.

                          O que estou fazendo de errado ou o que preciso configurar?

                          Obrigado.

                          PS.: Windows 7.

                          Abs

                          Comment

                          X
                          Working...
                          X