Vulnerability Analysis Web Application Security

Paskto – Passive Web Scanner

Paskto will passively scan the web using the Common Crawl internet index either by downloading the indexes on request or parsing data from your local system. URLs are then processed through Nikto and known URL lists to identify interesting content. Hash signatures are also used to identify known default content for some IoT devices or web applications.

Dependencies:
+ nodeJS

Create Custom Digest signatures
A quick way to create new digest signatures for default content is to us WARCPinch which is a Chrome Extension I hacked together based off of WARCreate except it creates digital signatures as well as WARC files. (Also adds highlight and right click functionality, which is useful to just highlight any identifying text to use as the name of the signatures).

Examples:

Scan domain, save results and URLs   
    $ node paskto.js -s "www.msn.com" -o /tmp/rest-results.csv -a /tmp/all-       urls.csv                                                                       
Scan domain with CC wildcards.       
    $ node paskto.js -s "*.msn.com" -o /tmp/rest-results.csv -a /tmp/all-urls.csv  
Scan domain, only save URLs.         
    $ node paskto.js -s "www.msn.com" -o /tmp/rest-results.csv                     
Scan dir with indexes.               
    $ node paskto.js -d "/tmp/CC-MAIN-2017-39-index/" -o /tmp/rest-results.csv -a  /tmp/all-urls.csv                                                              

Download Paskto

About the author

Mazen Elzanaty

Add Comment

Click here to post a comment

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: