Chapter 5. Automated Scanners

In this chapter we will cover:

  • Scanning with Nikto
  • Finding vulnerabilities with Wapiti
  • Using OWASP ZAP to scan for vulnerabilities
  • Scanning with w3af
  • Using Vega scanner
  • Finding Web vulnerabilities with Metasploit's Wmap

Introduction

Almost every penetration testing project must follow a strict schedule, mostly determined by clients' requirements or development delivery dates. It is very useful for a penetration tester to have a tool that can perform plenty of tests on an application in a short period of time in order to identify the biggest possible number of vulnerabilities in the scheduled days. Automated vulnerability scanners are the tools to pick for this task. They can also be used to find exploitation alternatives or to be sure that one doesn't leave something obvious behind in a penetration test.

Kali Linux includes several vulnerability scanners aimed at Web applications or specific Web application vulnerabilities; in this chapter, we will cover some of the most widely used by penetration testers and security professionals.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.138.104