Striker - Recon & Vulnerability Scanning Suite

(817 views)

Striker 2.0 is still in the prototype phase, which means it's not intended to be used by regular users. It has been made public for contributions to make the development faster. Usage: python3 striker.py example.com Workflow Phase 1: Attack Surface Discovery This phase includes finding subdomains of the user-specified domain, filtering alive hosts as well scanning of 1000 most common TCP ports. Phase 2: Sweeping Mass scanning of misconfigured HTTP response headers, croassdomain.xml as well as checks for some sensitive files is done in this phase. Phase 3: Aggressive Information Gathering This phase is dedicated to data gathering by crawling the subdomains. The gathered data is used to find outdated JS libraries, detect CMS and technologies in use. HTML forms that are tested in later phases for vulnerability detection are also collected during this crawling. Phase 4: Vulnerability Scanning [This phase is under development] Credits /db/outdated_js.json is taken from retire.js.....

June 25, 2020
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.