• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Sn1per v7.3 Automated Pentest Recon Scanner

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,612
Solutions
2
Reputation
32
Reaction score
100,454
Points
2,313
Credits
32,640
‎6 Years of Service‎
 
76%
snipper.png


Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security’s premium reporting add-on for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes. For more information regarding Sn1per Professional, go to
This link is hidden for visitors. Please Log in or register now.


FEATURES:

    Automatically collects basic recon (ie. whois, ping, DNS, etc.)
    Automatically launches Google hacking queries against a target domain
    Automatically enumerates open ports via Nmap port scanning
    Automatically brute forces sub-domains gathers DNS info and checks for zone transfers
    Automatically checks for sub-domain hijacking
    Automatically runs targeted Nmap scripts against open ports
    Automatically runs targeted Metasploit scan and exploit modules
    Automatically scans all web applications for common vulnerabilities
    Automatically brute forces ALL open services
    Automatically test for anonymous FTP access
    Automatically runs WPScan, Arachni and Nikto for all web services
    Automatically enumerates NFS shares
    Automatically test for anonymous LDAP access
    Automatically enumerate SSL/TLS cyphers, protocols and vulnerabilities
    Automatically enumerate SNMP community strings, services and users
    Automatically list SMB users and shares, check for NULL sessions and exploit MS08-067
    Automatically exploit vulnerable JBoss, Java RMI and Tomcat servers
    Automatically tests for open X11 servers
    Auto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat Creds
    Performs high-level enumeration of multiple hosts and subnets
    Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting
    Automatically gathers screenshots of all websites
    Create individual workspaces to store all scan output

Changelog

    v7.3 – Added CVE-2019-15107 Webmin <= 1.920 – Unauthenticated RCE MSF exploit
    v7.3 – Added massdns plugin
    v7.3 – Added altdns plugin
    v7.3 – Added dnsgen plugin
    v7.3 – Updated web file/dir wordlists from public exploits and honeypots
    v7.3 – Added time stamps to all commands
    v7.3 – Removed CloudFront from domain hijacking checks
    v7.3 – Removed snmp-brute.nse script due to scan issues
    v7.3 – Fixed issue with discover scan workspace names
    v7.3 – Fixed issue with DockerFile (sed: can’t read /usr/bin/msfdb: No such file or directory)
    v7.3 – Fixed issue with installer on docker not having pip installed
    v7.3 – Fixed issue with port 161 not being referenced correctly in scans


To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top