10
10
# ===============================================================================
11
11
12
12
13
+ # vars
13
14
VERSION=" 0.0.3b"
14
- # Where to find vulners.nse :
15
- VULNERSDIR=" nmap-vulners"
16
- SECLISTDIR=" SecLists"
17
- REPORTDIR=" report" # report directory
15
+ VULNERSDIR=" nmap-vulners" # Where to find vulners.nse
16
+ REPORTDIR=" report" # /report directory
18
17
TOOLS=( " nmap" " nikto" " uniscan" " gobuster" " dirb" " whatweb" )
18
+ # SECLISTDIR="SecLists"
19
19
20
+ # banner / help message
20
21
echo " "
21
22
echo -e " \e[00;32m#############################################################\e[00m"
22
23
echo " "
98
99
echo -e " Target: $2 "
99
100
100
101
# Whatweb
101
- echo -e " [ +] Looking up " $2 " with whatweb"
102
+ echo -e " \e[00;32m [ +] Looking up " $2 " with whatweb" " \e[00m "
102
103
whatweb -a3 $2 | tee ${REPORTDIR} /$2 _whatweb.txt
103
104
104
- echo -e " [ +] OSIRA on:" $2
105
+ echo -e " \e[00;32m [ +] OSIRA on:" $2 " \e[00m "
105
106
OSIRA/osira.sh -u $2 | tee ${REPORTDIR} /$2 _osira.txt
106
107
mv $2 .txt ${REPORTDIR} /$2 _osira.txt
107
108
108
109
# nmap
109
- echo -e " [+] nmap with standard scripts (-sC) on $2 "
110
- nmap -sSCV -Pn -T4 -vv $2 -oA ${REPORTDIR} /$2 _nmap_sSCV
111
- echo -e " [+] nmap with http-enum on $2 "
112
- nmap -sSV -Pn -O -T4 -vv --script http-enum $2 -oA ${REPORTDIR} /$2 _nmap_http-enum
113
- echo -e " [+] nmap with various HTTP vuln nse scripts on $2 "
114
- nmap -sSV -Pn -T4 -vv --script " http-*" $2 -oA ${REPORTDIR} /$2 _nmap_http-va
115
- echo -e " [+] nmap with vulners on $2 "
116
- nmap -sSV -Pn -A -T4 -vv --script ${VULNERSDIR} /vulners.nse $2 -oA ${REPORTDIR} /$2 _nmap_vulners
110
+ echo -e " \e[00;32m [+] nmap with standard scripts (-sC) on $2 " " \e[00m"
111
+ nmap -sSCV -Pn -T4 $2 -oA ${REPORTDIR} /$2 _nmap_sSCV
112
+ echo -e " \e[00;32m [+] nmap with http-enum on $2 " " \e[00m"
113
+ nmap -sSV -Pn -O -T4 --script http-enum $2 -oA ${REPORTDIR} /$2 _nmap_http-enum
114
+ echo -e " \e[00;32m [+] nmap with various HTTP vuln nse scripts on $2 " " \e[00m"
115
+ nmap -sSV -Pn -T4 --script " http-*" $2 -oA ${REPORTDIR} /$2 _nmap_http-va
116
+ echo -e " \e[00;32m [+] nmap with vulners on $2 " " \e[00m"
117
+ echo ${VULNERSDIR} " /vulners.nse"
118
+ nmap -sV -Pn -O -T4 --script ${VULNERSDIR} /vulners.nse $2 --script-args mincvss=5-0 -oA ${REPORTDIR} /$2 _nmap_vulners
117
119
118
120
# nikto
119
- echo -e " [ +] nikto on $2 "
121
+ echo -e " \e[00;32m [ +] nikto on $2 " " \e[00m "
120
122
nikto -h $2 -C all -ask no -evasion A | tee $REPORTDIR /$2 _nikto.txt
121
123
122
124
# uniscan
123
- echo -e " [ +] uniscan on $2 "
125
+ echo -e " \e[00;32m [ +] uniscan of $2 " " \e[00m "
124
126
uniscan -u $2 -qweds | tee $REPORTDIR /$2 _uniscan.txt
125
127
126
128
# Supergobuster: gobuster + dirb
129
+ echo -e " \e[00;32m [+] super go busting $2 " " \e[00m"
127
130
./supergobuster.sh $2 | tee $REPORTDIR /$2 _supergobust.txt
128
131
129
132
echo -e " \e[00;32m [+] WAES is done. Find results in:" ${REPORTDIR} " \e[00m"
0 commit comments