Scanner and Patcher is an open source software which comes with a set of web vulnerability scanner and also provide patches for it.
This is the documentation for open source Scanner and Patcher Project.
Open Source Scanner and Patcher is a software which comes with a set of web vulnerability scanners and it provides patches for it. In this we are using powerful and specialized open source tools which enable us to carefully and thoroughly scan the given web application for a wide array of vulnerabilities. We have designed a solution where once a target web application has been entered in the program, the entire process can easily run without any need to monitor it. As for our patcher we have developed specific patches to patch vulnerabilities
A web application scanner explores a web application by crawling through its web pages and examines it for security vulnerabilities, which involves generation of malicious inputs and evaluation of application's responses. The scanners are automated tools that scan web applications to look for security vulnerabilities. They test web applications for common security problems such as cross-site scripting (XSS), SQL injection, and cross-site request forgery (CSRF).
This scanner uses different tools like nmap, dnswalk, dnsrecon, dnsenum, dnsmap etc in order to scan ports, sites, hosts and network to find vulnerabilities like OpenSSL CCS Injection, Slowloris, Denial of Service, etc.
A patch is a software update comprised code inserted (or patched) into the code of an executable program. Typically, a patch is installed into an existing software program. Patches are often temporary fixes between full releases of a software package.
Patches may do any of the following:
1. Fix a software bug.
2. Install new drivers.
3. Address new security vulnerabilities.
4. Address software stability issues.
5. Upgrade the software.
1. | IPv6 | 12. | STUXNET | 23. | Interesting Files |
2. | POODLE | 13. | Stress Tests | 24. | Injectable Paths |
3. | Firewall | 14. | WebDAV | 25. | Subdomains |
4. | LOGJAM | 15. | LFI, RFI or RCE. | 26. | MS-SQL DB Service |
5. | HEARTBLEED | 16. | XSS, SQLi, BSQL | 27. | ORACLE DB Service |
6. | Wordpress, SiteMap/Robot.txt | 17. | XSS Header not present | 28. | RDP Server over UDP and TCP |
7. | OpenSSL CCS Injection | 18. | Shellshock Bug | 29. | MySQL DB Service |
8. | FREAK | 19. | Leaks Internal IP | 30. | SNMP Service |
9. | Slowloris, Denial of Service | 20. | HTTP PUT DEL Methods | 31. | SMB Ports over TCP and UDP |
10. | STUXNET | 21. | Outdated | 32. | IIS WebDAV |
11. | Telnet Service | 22. | CGI Directories | 33. | X-XSS Protection |
1. | Whatweb | 9. | Davtest | 17. | nikto |
2. | Nmap | 10. | Theharvester | 18. | Whois |
3. | Golismero | 11. | Xsser | 19. | Ibd |
4. | Host | 12. | Fierce | 20. | Wapiti |
5. | Wget | 13. | Dnswalk | 21. | Dnsmap |
6. | Uniscan | 14. | Dnsrecon | 22. | Devtest |
7. | Wafw00f | 15. | dnsenum | 23. | sslyze |
8. | Drib | 16. | Dmitry |
"We have also worked on making separate programs which the user can utilize to scan for specific vulnerabilities but to make a complete scan for the list of vulnerabilities please utilize the full scanner."
Local File Inclusion (LFI) allows an attacker to include files on a server through the web browser. This vulnerability exists when a web application includes a file without correctly sanitising the input, allowing an attacker to manipulate the input and inject path traversal characters and include other files from the web server. An LFI attack may lead to information disclosure, remote code execution, or even Cross-site Scripting (XSS). Typically, LFI occurs when an application uses the path to a file as input. If the application treats this input as trusted, a local file may be used in the include statement.