Exploit Database


SEARCHSPLOIT

apt install exploitdb
Install ExploitDB.

serachsploit name version
Recherche d’exploits connues (de Exploit-DB).

serachsploit -x 4401
Affiche l’exploit 4401.

Web Vulnerability Scanners


NICKTO

nikto -h [TARGET_IP]
Web vuln scan.

nikto -h http://[TARGET_IP]:[TARGET_PORT]/path -id myUser:myPass
Web vuln scan with credential and login page.


WPSCAN

wpscan --url [TARGET_IP] -e u,vp,vt
Scan Wordpress.

-e vp
Enumerate Vulnerable Plugins.

-e vt
Enumerate Vulnerable Themes.

-e cb
Enumerate Config Backups.

-e dbe
Enumerate DB Exports.

-e u
Enumerate Users.

General Vulnerability Scanners


NESSUS

https://docs.tenable.com/nessus/Content/DeployNessusDocker.htm

docker run -p 8834:8834 --name nessus tenableofficial/nessus
Start Nessus scanner.

The scanner will be accessible at: https://127.0.0.1:8834/

To use the scanner, you need to create an account.
You can create a free Nessus Essentials account here: https://fr.tenable.com/products/nessus/nessus-essentials


Greenbone Vulnerability Manager

https://greenbone.github.io/docs/latest/22.4/container/index.html

curl -f -L https://greenbone.github.io/docs/latest/_static/docker-compose-22.4.yml -o docker-compose.yml
Download Docker Copose file.

docker-compose -f docker-compose.yml -p greenbone-community-edition up
Start Greenbone scanner.

docker-compose -f docker-compose.yml -p greenbone-community-edition down
Stop Greenbone scanner.

The scanner will be accessible with default credentials (admin:admin) at: http://127.0.0.1:9392/