04 March 2014 | 2,293 views

EyeWitness – A Rapid Web Application Triage Tool

Check For Vulnerabilities with Acunetix

EyeWitness is a rapid web application triage tool designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.

EyeWitness

The author would love for EyeWitness to identify more default credentials of various web applications. So as you find devices which utilizes default credentials, please e-mail him the source code of the index page and the default credentials so he can add it in to EyeWitness. You can e-mail to EyeWitness [@] christophertruncer [dot] com.

Inspiration came from Tim Tomes’s PeepingTom Script. The author just wanted to change some things, and then it became a thought exercise to write it again himself.

EyeWitness is designed to run on Kali Linux. It will auto detect the file you give it with the -f flag as either being a text file with URLs on each new line, nmap xml output, or nessus xml output. The -t (timeout) flag is completely optional, and lets you provice the max time to wait when trying to render and screenshot a web page. The –open flag, which is optional, will open the URL in a new tab within iceweasel.

Setup

Navigate into the setup directory and run the setup.sh script.

Usage

Examples

You can download EyeWitness here (Or clone the Github repo):

master.zip

Or read more here.



Recent in Hacking Tools:
- clipcaptcha – CAPTCHA Service Impersonation Tool
- dirs3arch – HTTP File & Directory Brute Forcing Tool
- ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security

Related Posts:
- RAWR – Rapid Assessment of Web Resources
- CERT Triage Tools – Vulnerability Impact Assessment Tool
- Security Compass Web Application Analysis Tool – SWAAT

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,858,124 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,043,913 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 619,374 views

Advertise on Darknet

Comments are closed.