websploit Usage Example

root@kali:~# websploit
WARNING: No route found for IPv6 destination :: (no default route?)

     __          __  _               _       _ _
     \ \        / / | |             | |     (_) |
      \ \  /\  / /__| |__  ___ _ __ | | ___  _| |_
       \ \/  \/ / _ \ '_ \/ __| '_ \| |/ _ \| | __|
        \  /\  /  __/ |_) \__ \ |_) | | (_) | | |_
         \/  \/ \___|_.__/|___/ .__/|_|\___/|_|\__|
                              | |
                              |_|

        --=[WebSploit FrameWork
    +---**---==[Version :2.0.5 BETA
    +---**---==[Codename :We're Not Crying Wolf
    +---**---==[Available Modules : 19
        --=[Update Date : [r2.0.5-000 2.3.2014]



wsf > use web/dir_scanner
wsf:Dir_Scanner > set TARGET http://192.168.1.202
TARGET =>  192.168.1.202
wsf:Dir_Scanner > run
[*] Your Target : 192.168.1.202
[*]Loading Path List ... Please Wait ...
[index] ... [400 Bad Request]
[images] ... [400 Bad Request]
[download] ... [400 Bad Request]
[2006] ... [400 Bad Request]
[news] ... [400 Bad Request]
[crack] ... [400 Bad Request]

Packages and Binaries:

websploit

WebSploit is an open source project which is used to scan and analysis remote system in order to find various type of vulnerabilites. This tool is very powerful and supports multiple vulnerabilities.

Installed size: 77 KB
How to install: sudo apt install websploit

  • python3
  • python3-requests
  • python3-scapy
websploit

Advanced MITM Framework

root@kali:~# man websploit
WEBSPLOIT(1)                General Commands Manual               WEBSPLOIT(1)

NAME
       websploit - Advanced MITM Framework

SYNOPSIS
       websploit

DESCRIPTION
       Websploit is an automatic vulnerability assessment, web scanner and ex-
       ploiter tool. It is python command line tool that is composed on  modu-
       lar  structure pretty similar to Metasploit. There are currently 7 mod-
       ules.  The command line does not accept any options. User just get into
       console  typing "websploit" as root and the prompt will change to this:
       wsf >

OPTIONS
       wsf > help
              Shows all command you can type in the websploit console. Some of
              them are only aplicable when using a certain module.

       wsf > show
              Show Modules of Current Database

       wsf > use <module_name>
              Select Module For Use

       wsf > options
              Show Current Options Of Selected Module

       wsf > set <module_option>
              Once  you  had  seen the options of the selected module, you may
              use this command to define its desired value.

       wsf > back
              Exit current module

       wsf > update
              Disabled on Debian systems in order to avoid conflicts with apt-
              get.

       wsf > about
              Shows info about the author.

EXAMPLES
       Here  is  a  simple  example on how to use scan_wifi module in order to
       hunt existing wifi networks.
              wsf > scan_wifi > execute
              SSID                                     BSSID          CHANNEL   SIGNAL     BARS         SECURITY
              EDTSTAR_2350                     1C-B0-44-38-98-49         11             89                           WPA2
              JAZZTWE_aJpE                     00-4A-77-4D-C4-CC          1             69            _           WPA1 WPA2
              RadioPatioA1985                     74-9D-79-2A-47-60      11             57            _              WPA2
              MIWIFI_dsTp                         EC-BE-ED-39-1A-D2       1             44            __             WPA2
              DabaduNet4434                       78-84-B4-51-44-35       8             44            __             WPA2
              MyHomenet821                     74-7D-79-52-2A-00          1             37            __             WPA2

                                                                  WEBSPLOIT(1)

Updated on: 2021-Nov-26