Tuesday, 3 October 2017

Modules for hackers

Post oleh : covid-19 | Rilis : October 03, 2017 | Series :


     


Home


Hacks


THREATS


PENTESTING


KALI


SOC


Infosec


TECH


Linux


KALI


PENTESTING


Yuki Chan – Automated Penetration Testing and Auditing Tool – Detailed Explanation

By

 BALAJI N

 -

 October 3, 2017 

0

Yuki Chan is an Automated  Penetration Testing tool that will be auditing all standard security assessment for you.It is one of the Best Penetration testing Tool which provides many Integrated Security Tools and Performing Many Penetration testing Operation into Target Network.

There are more than  15 Modules has been Integrated with Yuki chan and it is one of the most powerful tools for Auditing the network.

Number Of Modules

Whois domain analyzer


Nslookup


Nmap


TheHarvester


Metagoofil


DNSRecon


Sublist3r


Wafw00f


WAFNinja


XSS Scanner


WhatWeb


Spaghetti


WPscan


WPscanner


WPSeku


Droopescan ( CMS Vulnerability Scanner WordPress, Joomla, Silverstripe, Drupal, And Moodle)


SSLScan


SSLyze


A2SV


Dirsearch


Yuki Chan Futures

Automated


Intel-Gathering


Vulnerability Analysis


Security Auditing


OSINT


Tracking


System Enumeration


Fuzzing


CMS Auditing


SSL Security Auditing


And Off Course This Tool Designed For Targeted Pentesting Too


How to do Penetration Testing your Network with Yuki Chan

Initially, Download Yuki Chan from   GitHub Clone.  —>>     Download

The first Step we need to Download and Install the Yuki Chan.

Ok in my recent OS (Kali Linux) has been already installed this module

Nmap


Wafw00f


WPScan


SSLScan


SSLyze


So if your OS Doesn’t Have it then you can install it first here I give you resource

Nmap

Red Hat, Fedora, Mandrake, and Yellow Dog Linux with Yum

#yum install nmap

Debian Linux and Derivatives such as Ubuntu

#apt-get install nmap

Wafw00f

#git clone https://github.com/EnableSecurity/wafw00f.git

#cd wafw00f

#python setup.py install

or simple way

#pip install wafw00

WPScan

#git clone https://github.com/wpscanteam/wpscan.git

#cd wpscan

#sudo gem install bundler && bundle install –without test

SSLyze 

#git clone https://github.com/nabla-c0d3/sslyze.git

Yuki Installation Process

Let go and Install the Yuki.

#cd Desktop

#git Clone https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest

Later Give Chmod 777 Access Level

#chmod 777 wafninja joomscan install-perl-module.sh yuki.sh

And Then Install Python Module

#pip install -r requirements.txt

Once Complete an all the Requirements then Launch the Yuki

preparation finished now run this tool.

#./yuki.sh

Once Launch the Tool Then Enter you Target Website that you want to do Penetration Testing.

Here I have used “exploit-db.com”

Once Click you Enter Button Yuki Will getting Start to Scan you Entire Target Network and Give you a Tons of Valuable Information to you by helping of its Integrated Security Tools

In this Result, We can able the Gathering the Information about the Target network using Whois Lookup.

Nex one Nmap Will Start it Process to Scan the Target Website and its Provide the Information about the open Ports and other related information.

Next theharvester will Provide to Penetration testers in the early stages of the penetration test in order to understand the customer footprint on the Internet. It is also useful for anyone that wants to know what an attacker can see about their organization.

Following theHarvester , Many Tools are Performing an Auditing Against the Target and Provide you a complete Result.

Here i have used our Website “gbhackers.com” for testing Purpose.

Disclaimer

This article is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.gbhackers.com  will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

Share and Support Us :

Click to share on Facebook (Opens in new window)


Click to share on LinkedIn (Opens in new window)


Click to share on Twitter (Opens in new window)


Click to share on Google+ (Opens in new window)


Click to share on Pinterest (Opens in new window)


Click to share on Telegram (Opens in new window)


Click to share on Reddit (Opens in new window)


Click to share on WhatsApp (Opens in new window)


TAGS


Nmap


Penetration Testing


SSLyze


WAFW00F


WPScan


Yuki



http://www.gbhackers.com

BALAJI is a Security Researcher (Threat Research Labs) at Comodo Security. Ethical Hacker, Editor-in-Chief, Author & Co-Founder of GBHackers On Security & Tech Incidents

   

RELATED ARTICLESMORE FROM AUTHOR

PENTESTING

Web Application Penetration Testing Checklist – A Detailed Cheat Sheet

PENTESTING

Penetration testing with your WordPress Website-Detailed Explanation

KALI

Kali Linux 2017.2 Released With Powerful New Tools

PENTESTING

Wireless Penetration Testing Checklist – A Detailed Cheat Sheet

PENTESTING

Top 10 Penetration Testing & Ethical Hacking Linux Distributions – 2017

PENTESTING

An Ultimate Checklist for Application Security Testing

GBHackers On Security || Lands into Top 100 Information Security Blogs in the Planet

NEWSLETTER

Get the latest updates sent directly to your inbox.

Most Popular

Networking with Drones in Seas

September 19, 2016

CoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum...

July 18, 2017

Is it a legitimate website

October 24, 2016

Android Ransomware(King online) Locks Phone and Asks Ransom to unlock Phone

January 20, 2017

Large scale Cyber attack Targeting Weak Spot in the Vital Electrical...

August 8, 2017

Recommended

Data Breach

‘Professional’ hackers steal industrial secrets from ThyssenKrupp

Ransomware

“Ransomware as a Service” Provide SATAN Ransomware in Dark web to...

Malware

“Super Malware” Steals Encryption Keys From Intel SGX Isolated Memory Fields

Viruses

10 Worst Computer Viruses of All Time

Password Attacks

100 Million unencrypted passwords Leaked From Russian portal

Data Breach

198 Million American Voters Personal Records Leaked In Public- Biggest Voters...

CVE/vulnerability

200 Million Downloaded video players including VLC Player are vulnerable...

spyware

200 Million Installed Keyboard App “GO Keyboard” Spying & Stealing Data...

Backdoor

200 Unique Android Apps Discovered with Backdoor Called “MilkyDoor” Downloaded...

TECH

2017 Cybersecurity Predictions

Hacks

25 Years Old Hacker Steals Hundreds of User Accounts from US...

PCI DSS Breach

320,000 Financial Records Apparently Stolen From Payment Processor,leaked online

Data Breach

32TB of Windows 10 Internal builds & Source Code leaked online

Infosec- Resources

4 Cybersecurity Risks We willl Face With New WhatsApp Status...

Malware

4.2 Million Android Mobile Infected by “ExpensiveWall” Malware That Can Control...

Backdoor

400 Million Windows Computer Vulnerable to “Bashware” Security Software Bypass Attack

CVE/vulnerability

6 Critical RCE and Buffer Overflow Vulnerabilities in IBM Informix...

Data Breach

6 Million Verizon Customers Data Leaked online Due to Misconfigured ...

Password Attacks

8,00,000 Virgin Media Home Routers Vulnerable to Password Attacks, Virgin...

Malware

87 fake Minecraft mods reached up to 990,000 Android users spotted...



ABOUT US

GBHackers on Security is Advanced Persistent Cyber Security Online platform which including Cyber Security Research,Web Application and Network Penetration Testing, Hacking Tutorials,Live Security Updates, Technology updates, Security investigations With dedicated Cyber security Expert Team and help to community more secure.

Contact us: admin@gbhackers.com

FOLLOW US

     


 

TECH


 

Infosec- Resources


 

OWASP – Top 10


 

Privacy Policy


 

Contact Us


© GBHackers on Security 2017. All Rights Reserved

google+

linkedin

Cyber Ghost. Powered by Blogger.