skipfish – Automated Web Application Security Reconnaissance Tool

The New Acunetix V12 Engine


The safety of the Internet is of paramount importance to Google, and helping web developers build secure, reliable web applications is an important part of the equation. To advance this goal, Google has released projects such as ratproxy, a passive security assessment tool.

The latest is they have announced a new tool called skipfish – a free, open source, fully automated, active web application security reconnaissance tool.

Key Features

  • High speed: written in pure C, with highly optimized HTTP handling and a minimal CPU footprint, the tool easily achieves 2000 requests per second with responsive targets.
  • Ease of use: the tool features heuristics to support a variety of quirky web frameworks and mixed-technology sites, with automatic learning capabilities, on-the-fly wordlist creation, and form autocompletion.
  • Cutting-edge security logic: we incorporated high quality, low false positive, differential security checks capable of spotting a range of subtle flaws, including blind injection vectors.

The tool is believed to support Linux, FreeBSD 7.0+, MacOS X, and Windows (Cygwin) environments.

You can download skipfish here:

skipfish-1.10b.tgz

Or read more here.

Posted in: Hacking Tools, Web Hacking

, , , , ,


Latest Posts:


Eraser - Windows Secure Erase Hard Drive Wiper Eraser – Windows Secure Erase Hard Drive Wiper
Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
Insecure software versions are a problem Web Security Stats Show XSS & Outdated Software Are Major Problems
Netsparker just published some anonymized Web Security Stats about the security vulnerabilities their online solution identified on their users’ web applications and web services during the last 3 years.
CTFR - Abuse Certificate Transparency Logs For HTTPS Subdomains CTFR – Abuse Certificate Transparency Logs For HTTPS Subdomains
CTFR is a Python-based tool to Abuse Certificate Transparency Logs to get subdomains from a HTTPS website in a few seconds.
testssl.sh - Test SSL Security Including Ciphers, Protocols & Detect Flaws testssl.sh – Test SSL Security Including Ciphers, Protocols & Detect Flaws
testssl.sh is a free command line tool to test SSL security, it checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more.
Four Year Old libSSH Bug Leaves Servers Wide Open Four Year Old libssh Bug Leaves Servers Wide Open
A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn't that big as neither OpenSSH or the GitHub implementation are affected.
CHIPSEC - Platform Security Assessment Framework CHIPSEC – Platform Security Assessment Framework For Firmware Hacking
CHIPSEC is a platform security assessment framework for PCs including hardware, system firmware (BIOS/UEFI), and platform components for firmware hacking.


3 Responses to skipfish – Automated Web Application Security Reconnaissance Tool

  1. Sherif March 22, 2010 at 10:57 am #

    I’ve been playing with this program for quite a while and it picked issues nikto or nessus did not.

    you’ll need libidn, get it from http://www.gnu.org/software/libidn/ and configure & make

    The bare minimum syntax will be:
    ./skipfish -o /foo/OutputFolder -W dictionaries/standard.wl http://YourWebServer

    By the way, I LOVE YOUR BLOG! , really, keep it up!

  2. Amr Ali March 25, 2010 at 1:30 pm #

    Yep I’ve faced the same dependency issue, however all I had to do was “apt-get install libidn11”. Once compiled and I started playing with it, its a very well done package.

    And yes I’m a huge fan too, I have been stalking this blog for over 4 years now.

  3. Darknet March 26, 2010 at 5:06 am #

    Thanks for the feedback guys, I’m sure it’ll be useful for other readers and thanks for following us! Keep on reading and I’ll keep on writing :)