Exploit Database
SEARCHSPLOIT
apt install exploitdbInstall ExploitDB.
serachsploit name versionRecherche d’exploits connues (de Exploit-DB).
serachsploit -x 4401Affiche l’exploit 4401.
Web Vulnerability Scanners
NICKTO
nikto -h [TARGET_IP]Web vuln scan.
nikto -h http://[TARGET_IP]:[TARGET_PORT]/path -id myUser:myPassWeb vuln scan with credential and login page.
WPSCAN
wpscan --url [TARGET_IP] -e u,vp,vtScan Wordpress.
-e vpEnumerate Vulnerable Plugins.
-e vtEnumerate Vulnerable Themes.
-e cbEnumerate Config Backups.
-e dbeEnumerate DB Exports.
-e uEnumerate Users.
General Vulnerability Scanners
NESSUS
https://docs.tenable.com/nessus/Content/DeployNessusDocker.htm
docker run -p 8834:8834 --name nessus tenableofficial/nessusStart Nessus scanner.
The scanner will be accessible at: https://127.0.0.1:8834/
To use the scanner, you need to create an account.You can create a free Nessus Essentials account here: https://fr.tenable.com/products/nessus/nessus-essentials
Greenbone Vulnerability Manager
https://greenbone.github.io/docs/latest/22.4/container/index.html
curl -f -L https://greenbone.github.io/docs/latest/_static/docker-compose-22.4.yml -o docker-compose.ymlDownload Docker Copose file.
docker-compose -f docker-compose.yml -p greenbone-community-edition upStart Greenbone scanner.
docker-compose -f docker-compose.yml -p greenbone-community-edition downStop Greenbone scanner.
The scanner will be accessible with default credentials (admin:admin) at: http://127.0.0.1:9392/