There are more than 15 Modules has been Integrated with Yuki chan and it is one of the most useful assets for Auditing the system.
Number Of Modules
Whois area analyzer
Droopescan ( CMS Vulnerability Scanner WordPress, Joomla, Silverstripe, Drupal, And Moodle)
Yuki Chan Futures
SSL Security Auditing
Furthermore, Off Course This Tool Designed For Targeted Pentesting Too
Step by step instructions to do Penetration Testing your Network with Yuki Chan
At first, Download Yuki Chan from GitHub Clone. — >> Download
The initial Step we have to Download and Install the Yuki Chan.
Alright. in my ongoing OS (Kali Linux) has been as of now introduced this module
So in the event that your OS doesn’t have it, at that point you can introduce it first here I give you assets.
Red Hat, Fedora, Mandrake, and Yellow Dog Linux with Yum
#yum introduce nmap
Debian Linux and Derivatives, for example, Ubuntu
#apt-get introduce nmap
#git clone https://github.com/EnableSecurity/wafw00f.git
#python setup.py introduce
or on the other hand straightforward way
#pip introduce wafw00
#git clone https://github.com/wpscanteam/wpscan.git
#sudo diamond introduce bundler && pack introduce – without test
#git clone https://github.com/nabla-c0d3/sslyze.git
Yuki Installation Process
Give up and Install the Yuki.
#git Clone https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest
Later Give Chmod 777 Access Level
#chmod 777 wafninja joomscan introduce perl-module.sh yuki.sh
And afterward Install Python Module
#pip introduce – r requirements.txt
When Complete an all the Requirements at that point Launch the Yuki
readiness completed presently run this device.
When Launch the Tool Then Enter you Target Website that you need to do Penetration Testing.
Here I have utilized “abuse db.com”
When Click you Enter Button Yuki Will getting Start to Scan you Entire Target Network and Give you a Tons of Valuable Information to you by aiding of its Integrated Security Tools
In this Result, We can capable the Gathering the Information about the Target organize utilizing Whois Lookup.
Nex one Nmap Will Start it Process to Scan the Target Website and its Provide the Information about the open Ports and other related data.
Next theharvester will Provide to Penetration analyzers in the beginning phases of the infiltration test so as to comprehend the client impression on the Internet. It is likewise helpful for anybody that needs to recognize what an assailant can see about their association.