Automated Penetration Testing -polls.io

There are more than  15 Modules has been Integrated with Yuki chan and it is one of the most useful assets for Auditing the system.

Number Of Modules

Whois area analyzer

Nslookup

Nmap

TheHarvester

Metagoofil

DNSRecon

Sublist3r

Wafw00f

WAFNinja

XSS Scanner

WhatWeb

Spaghetti

WPscan

WPscanner

WPSeku

Droopescan ( CMS Vulnerability Scanner WordPress, Joomla, Silverstripe, Drupal, And Moodle)

SSLScan

SSLyze

A2SV

Dirsearch

Yuki Chan Futures

Robotized

Intel-Gathering

Weakness Analysis

Security Auditing

OSINT

Following

Framework Enumeration

Fluffing

CMS Auditing

SSL Security Auditing

Furthermore, Off Course This Tool Designed For Targeted Pentesting Too

Step by step instructions to do Penetration Testing your Network with Yuki Chan

At first, Download Yuki Chan from   GitHub Clone.  — >> Download

The initial Step we have to Download and Install the Yuki Chan.

Alright. in my ongoing OS (Kali Linux) has been as of now introduced this module

Nmap

Wafw00f

WPScan

SSLScan

SSLyze

So in the event that your OS doesn’t have it, at that point you can introduce it first here I give you assets.

Red Hat, Fedora, Mandrake, and Yellow Dog Linux with Yum

#yum introduce nmap

Debian Linux and Derivatives, for example, Ubuntu

#apt-get introduce nmap

#git clone https://github.com/EnableSecurity/wafw00f.git

#cd wafw00f

#python setup.py introduce

or on the other hand straightforward way

#pip introduce wafw00

#git clone https://github.com/wpscanteam/wpscan.git

#cd wpscan

#sudo diamond introduce bundler && pack introduce – without test

#git clone https://github.com/nabla-c0d3/sslyze.git

Yuki Installation Process

Give up and Install the Yuki.

#cd Desktop

#git Clone https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest

Later Give Chmod 777 Access Level

#chmod 777 wafninja joomscan introduce perl-module.sh yuki.sh

And afterward Install Python Module

#pip introduce – r requirements.txt

When Complete an all the Requirements at that point Launch the Yuki

readiness completed presently run this device.

#./yuki.sh

When Launch the Tool Then Enter you Target Website that you need to do Penetration Testing.

Here I have utilized “abuse db.com”

When Click you Enter Button Yuki Will getting Start to Scan you Entire Target Network and Give you a Tons of Valuable Information to you by aiding of its Integrated Security Tools

In this Result, We can capable the Gathering the Information about the Target organize utilizing Whois Lookup.

Nex one Nmap Will Start it Process to Scan the Target Website and its Provide the Information about the open Ports and other related data.

Next theharvester will Provide to Penetration analyzers in the beginning phases of the infiltration test so as to comprehend the client impression on the Internet. It is likewise helpful for anybody that needs to recognize what an assailant can see about their association.

Leave a Reply

Your email address will not be published. Required fields are marked *