{"id":3129,"date":"2011-06-15T09:54:47","date_gmt":"2011-06-15T08:54:47","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3129"},"modified":"2015-09-09T19:37:12","modified_gmt":"2015-09-09T11:37:12","slug":"skipfish-1-94b-released-active-web-application-security-reconnaissance-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2011\/06\/skipfish-1-94b-released-active-web-application-security-reconnaissance-tool\/","title":{"rendered":"Skipfish 1.94b Released – Active Web Application Security Reconnaissance Tool"},"content":{"rendered":"

It’s been a while since we last mentioned Skipfish, it was back in March 2010<\/a> when they first came out.<\/p>\n

Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. The resulting map is then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments.<\/p>\n

A number of commercial and open source tools with analogous functionality is readily available (e.g., Nikto<\/a>, Websecurify<\/a>, Netsparker<\/a>, w3af<\/a>, Arachni<\/a>); stick to the one that suits you best. That said, skipfish tries to address some of the common problems associated with web security scanners.<\/p>\n

Specific advantages include: <\/p>\n