PuzlBox: PHP Fuzz alat pemindai kerentanan
Posted: Wed Jul 28, 2010 9:11 pm
Terjemahan dari google...
PuzlBox adalah bulu PHP alat yang memindai beberapa kerentanan yang berbeda dengan melakukan analisis program dinamis. Hal ini dapat mendeteksi perintah eksekusi sewenang-wenang, inklusi file lokal, upload sewenang-wenang, dan beberapa jenis lainnya kerentanan. Dalam semua, dapat mendeteksi sebagai berikut:
* Arbitrary Command Execution
* Arbitrary PHP Execution
* Local File Inclusion
* Arbitrary File Read/Write/Change/Rename/Delete
* SQL Injection
* Reflected Cross-site Scripting Cross
Penggunaan:
! PuzlBox harus dijalankan level administrator!
puzlbox [-s Server (default localhost)] [-m Scan Modes (default CFLPSX)] [Absolute Web Root] [-n No Unhook] [Application Paths (comma delimited)]
Modes : Mode:
C – Arbitrary Command Execution
F – Arbitrary File Read/Write/Change/Rename/Delete
L – Local File Inclusion L
P – Arbitrary PHP Execution
S – SQL Injection
X – Reflected Cross-site Scripting
Contoh:
1. puzlbox c:\xampp\htdocs MyApp
Runs all scans on MyApp, located in web root c:\xampp\htdocs
1 puzlbox -m CX c:\xampp\htdocs MyApp1,MyApp2
Runs Arbitrary Command Execution and Reflected Cross-site Scripting scans on MyApp1
and MyApp2 located in web root c:\xampp\htdocs
Download PuzlBox v1.0.0.0
Sumber: http://pentestit.com
PuzlBox adalah bulu PHP alat yang memindai beberapa kerentanan yang berbeda dengan melakukan analisis program dinamis. Hal ini dapat mendeteksi perintah eksekusi sewenang-wenang, inklusi file lokal, upload sewenang-wenang, dan beberapa jenis lainnya kerentanan. Dalam semua, dapat mendeteksi sebagai berikut:
* Arbitrary Command Execution
* Arbitrary PHP Execution
* Local File Inclusion
* Arbitrary File Read/Write/Change/Rename/Delete
* SQL Injection
* Reflected Cross-site Scripting Cross
Penggunaan:
! PuzlBox harus dijalankan level administrator!
puzlbox [-s Server (default localhost)] [-m Scan Modes (default CFLPSX)] [Absolute Web Root] [-n No Unhook] [Application Paths (comma delimited)]
Modes : Mode:
C – Arbitrary Command Execution
F – Arbitrary File Read/Write/Change/Rename/Delete
L – Local File Inclusion L
P – Arbitrary PHP Execution
S – SQL Injection
X – Reflected Cross-site Scripting
Contoh:
1. puzlbox c:\xampp\htdocs MyApp
Runs all scans on MyApp, located in web root c:\xampp\htdocs
1 puzlbox -m CX c:\xampp\htdocs MyApp1,MyApp2
Runs Arbitrary Command Execution and Reflected Cross-site Scripting scans on MyApp1
and MyApp2 located in web root c:\xampp\htdocs
Download PuzlBox v1.0.0.0
Code: Select all
http://580a1576.linkbucks.com