Yuki Chan – Automated Penetration Testing and Auditing Tool – Detailed Explanation
By
-
October 3, 2017
Yuki Chan is an Automated Penetration Testing tool that will be auditing all standard security assessment for you.It is one of the Best Penetration testing Tool which provides many Integrated Security Tools and Performing Many Penetration testing Operation into Target Network.
There are more than 15 Modules has been Integrated with Yuki chan and it is one of the most powerful tools for Auditing the network.
Number Of Modules
Whois domain analyzer
Nslookup
Metagoofil
DNSRecon
Sublist3r
WAFNinja
WhatWeb
Spaghetti
WPscanner
WPSeku
Droopescan ( CMS Vulnerability Scanner WordPress, Joomla, Silverstripe, Drupal, And Moodle)
SSLScan
A2SV
Dirsearch
Yuki Chan Futures
Automated
Intel-Gathering
Vulnerability Analysis
Security Auditing
OSINT
Tracking
System Enumeration
Fuzzing
CMS Auditing
SSL Security Auditing
And Off Course This Tool Designed For Targeted Pentesting Too
How to do Penetration Testing your Network with Yuki Chan
Initially, Download Yuki Chan from GitHub Clone. —>> Download
The first Step we need to Download and Install the Yuki Chan.
Ok in my recent OS (Kali Linux) has been already installed this module
Nmap
Wafw00f
WPScan
SSLScan
SSLyze
So if your OS Doesn’t Have it then you can install it first here I give you resource
Red Hat, Fedora, Mandrake, and Yellow Dog Linux with Yum
#yum install nmap
Debian Linux and Derivatives such as Ubuntu
#apt-get install nmap
#git clone https://github.com/EnableSecurity/wafw00f.git
#cd wafw00f
#python setup.py install
or simple way
#pip install wafw00
#git clone https://github.com/wpscanteam/wpscan.git
#cd wpscan
#sudo gem install bundler && bundle install –without test
#git clone https://github.com/nabla-c0d3/sslyze.git
Yuki Installation Process
Let go and Install the Yuki.
#cd Desktop
#git Clone https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest
Later Give Chmod 777 Access Level
#chmod 777 wafninja joomscan install-perl-module.sh yuki.sh
And Then Install Python Module
#pip install -r requirements.txt
Once Complete an all the Requirements then Launch the Yuki
preparation finished now run this tool.
#./yuki.sh
Once Launch the Tool Then Enter you Target Website that you want to do Penetration Testing.
Here I have used “exploit-db.com”
Once Click you Enter Button Yuki Will getting Start to Scan you Entire Target Network and Give you a Tons of Valuable Information to you by helping of its Integrated Security Tools
In this Result, We can able the Gathering the Information about the Target network using Whois Lookup.
Nex one Nmap Will Start it Process to Scan the Target Website and its Provide the Information about the open Ports and other related information.
Next theharvester will Provide to Penetration testers in the early stages of the penetration test in order to understand the customer footprint on the Internet. It is also useful for anyone that wants to know what an attacker can see about their organization.
Following theHarvester , Many Tools are Performing an Auditing Against the Target and Provide you a complete Result.
Here i have used our Website “gbhackers.com” for testing Purpose.
Disclaimer
This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.
Share and Support Us :
Click to share on Facebook (Opens in new window)
Click to share on LinkedIn (Opens in new window)
Click to share on Twitter (Opens in new window)
Click to share on Google+ (Opens in new window)
Click to share on Pinterest (Opens in new window)
Click to share on Telegram (Opens in new window)
Click to share on Reddit (Opens in new window)
Click to share on WhatsApp (Opens in new window)
TAGS
BALAJI is a Security Researcher (Threat Research Labs) at Comodo Security. Ethical Hacker, Editor-in-Chief, Author & Co-Founder of GBHackers On Security & Tech Incidents
RELATED ARTICLESMORE FROM AUTHOR
Web Application Penetration Testing Checklist – A Detailed Cheat Sheet
Penetration testing with your WordPress Website-Detailed Explanation
Kali Linux 2017.2 Released With Powerful New Tools
Wireless Penetration Testing Checklist – A Detailed Cheat Sheet
Top 10 Penetration Testing & Ethical Hacking Linux Distributions – 2017
An Ultimate Checklist for Application Security Testing
GBHackers On Security || Lands into Top 100 Information Security Blogs in the Planet
NEWSLETTER
Get the latest updates sent directly to your inbox.
Most Popular
Networking with Drones in Seas
September 19, 2016
CoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum...
July 18, 2017
October 24, 2016
Android Ransomware(King online) Locks Phone and Asks Ransom to unlock Phone
January 20, 2017
Large scale Cyber attack Targeting Weak Spot in the Vital Electrical...
August 8, 2017
Recommended
‘Professional’ hackers steal industrial secrets from ThyssenKrupp
“Ransomware as a Service” Provide SATAN Ransomware in Dark web to...
“Super Malware” Steals Encryption Keys From Intel SGX Isolated Memory Fields
10 Worst Computer Viruses of All Time
100 Million unencrypted passwords Leaked From Russian portal
198 Million American Voters Personal Records Leaked In Public- Biggest Voters...
200 Million Downloaded video players including VLC Player are vulnerable...
200 Million Installed Keyboard App “GO Keyboard” Spying & Stealing Data...
200 Unique Android Apps Discovered with Backdoor Called “MilkyDoor” Downloaded...
2017 Cybersecurity Predictions
25 Years Old Hacker Steals Hundreds of User Accounts from US...
320,000 Financial Records Apparently Stolen From Payment Processor,leaked online
32TB of Windows 10 Internal builds & Source Code leaked online
4 Cybersecurity Risks We willl Face With New WhatsApp Status...
4.2 Million Android Mobile Infected by “ExpensiveWall” Malware That Can Control...
400 Million Windows Computer Vulnerable to “Bashware” Security Software Bypass Attack
6 Critical RCE and Buffer Overflow Vulnerabilities in IBM Informix...
6 Million Verizon Customers Data Leaked online Due to Misconfigured ...
8,00,000 Virgin Media Home Routers Vulnerable to Password Attacks, Virgin...
87 fake Minecraft mods reached up to 990,000 Android users spotted...
ABOUT US
GBHackers on Security is Advanced Persistent Cyber Security Online platform which including Cyber Security Research,Web Application and Network Penetration Testing, Hacking Tutorials,Live Security Updates, Technology updates, Security investigations With dedicated Cyber security Expert Team and help to community more secure.
Contact us: admin@gbhackers.com
FOLLOW US
© GBHackers on Security 2017. All Rights Reserved