bionic (1) websploit.1.gz

Provided by: websploit_3.0.0-2_all bug

NAME

       websploit - Advanced MITM Framework

SYNOPSIS

       websploit

DESCRIPTION

       Websploit  is an automatic vulnerability assessment, web scanner and exploiter tool. It is python command
       line tool that is composed on modular structure pretty similar to  Metasploit.  There  are  currently  20
       modules  into  four  sections.   The command line does not accept any options. User just get into console
       typing "websploit" and the prompt will change to this: wsf >

OPTIONS

       wsf > help
              Shows all command you can type in the websploit console. Some of  them  are  only  aplicable  when
              using a certain module.

       wsf > show modules
              Show Modules of Current Database

       wsf > use <module_name>
              Select Module For Use

       wsf > show options
              Show Current Options Of Selected Module

       wsf > set <module_option>
              Once  you  had  seen  the  options  of the selected module, you may use this command to define its
              desired value.

       wsf > scan
              Scan Wifi (Wireless Modules)

       wsf > stop
              Stop Attack & Scan (Wireless Modules)

       wsf > run
              Execute Module

       wsf > os
              Run console commands (ex : os ifconfig)

       wsf > back
              Exit current module

       wsf > upgrade | update
              Both of them are disabled on Debian systems in order to avoid conflicts with apt-get.

       wsf > about
              Shows info about the author.

EXAMPLES

       Here is a simple example on how to use apache_users  module  in  order  to  hunt  existing  Apache  users
       directories.
              sf > use web/apache_users
              wsf:Apache User > show options

               Options         Value
              -----------     ----------------
              URL             http://example.com

              wsf:Apache User > set url myown.example.org
              URL =>  myown.example.org
              wsf:Apache User > run
              [*] Your Target : myown.example.org
              [*]Loading Path List ... Please Wait ...
              [~root] ... [400 Bad Request]
              [~toor] ... [400 Bad Request]
              [~bin] ... [400 Bad Request]
              [~daemon] ... [400 Bad Request]
              [~adm] ... [400 Bad Request]
              [~lp] ... [400 Bad Request]
              [~sync] ... [400 Bad Request]
              etc

AUTHOR

       Fardin Allahverdinazhand <0x0ptim0us@Gmail.com>

       This manual page was written by Marcos Fouces <mfouces@yahoo.es>, for the Debian project (and may be used
       by others).

                                                                                                    WEBSPLOIT(1)