当前位置:网站首页>[download attached] a powerful web automated vulnerability scanning tool - Xray
[download attached] a powerful web automated vulnerability scanning tool - Xray
2022-07-26 11:48:00 【Network security self-study room】
Xray Is a powerful security assessment tool , The main features are :
Fast detection speed . Fast contract awarding ; The vulnerability detection algorithm is efficient . Support a wide range of . Big to OWASP Top 10 General vulnerability detection , As small as all kinds of CMS frame POC, Can support . High code quality . The quality of the people who write the code is high , adopt Code Review、 unit testing 、 Multi layer verification such as integration testing to improve code reliability . High quality can be customized . Various parameters of the engine are exposed through the configuration file , By modifying the configuration file, you can greatly customize the function . There is no threat to safety .xray Positioning as a safety assessment tool , Instead of attacking tools , All built in payload and poc All are harmless tests .
Download address :
GitHub:https : //github.com/chaitin/xray/releases At the end of the paper, we can get Xray Baidu cloud download address
Supported vulnerability detection types :


One . Installation and configuration process :
1. download exe
With windows Download, for example , Download to xray Under the table of contents , For the convenience of operation, the file name is modified as xray.exe;


2. open PowerShell
Enter PowerShell, Click on the open ; Enter the command : ./xray.exe version View version number ;
Input -h Command to view help information : command : ./xray.exe -h

see webscan Help information : command : ./xray.exe webscan -h

3. Generate Certificate
function ./xray.exe genca Command to generate certificate file ; Get into xray Under the table of contents , Double click Install Certificate ca.crt;

Installation certificate :


Import certificate succeeded !!!

Installation successful !!!
Function one . Scanning configuration of agent mode ( The target station can be set independently )**
Modify the configuration file : open config.yaml file ,ctrl+f Search for mitm key word >> Configure target station >> Set the target :

Function 2 . webscan Scan the website for vulnerabilities
Method 1: Set up proxy in browser : ip: 127.0.0.1 port :8080; Output the test results to the html In the format file :
./xray.exe webscan --listen 127.0.0.1:8080 --html-output test.html
Xray Use guide :( With DVWA For example, the range )
./xray.exe webscan --basic-crawler http://127.0.0.1/DVWA/index.php --html-output test.html
First let's open up DVWA shooting range , Hang up the agent >> Grab the bag >> take DVWA In the data package of the landing page cookie Copy it to our Xray In the configuration file of the scanning tool ;


And then we go into Xray In the configuration file of the scanning tool , take cookie Import profile , Then use the command :
( Be careful : With powershell Execution time , The order is ./xray.exe; With cmd Runtime , The order is xray.exe)
xray.exe webscan --basic-crawler http://127.0.0.1/DVWA/index.php
Yes dvwa Conduct vulnerability scanning in the shooting range ;( The scanning results are as follows )





The test results are output to our defined html Format file :( You can see that the scan shows DVWA Brute force cracking in the shooting range , Upload files ,sql Inject ,xss, Command line injection and other vulnerabilities )

Specify the scan plug-in :
Use --plugins Parameter can choose to enable only part of the scanning plug-in , Multiple plug-ins can be separated by commas , Such as :
./xray webscan --plugins cmd_injection --url http://example.com/
Use basic crawler crawling or crawler crawling links for subdivision scanning :
./xray.exe webscan --basic-crawler http://example.com
Be careful : With powershell Execution time , The order is ./xray.exe; With cmd Runtime , The order is xray.exe
summary :
ctrl + c Command exit ; 2 If the generated result report shows that it already exists , The folder report file can be deleted , Regenerate can also change the name of the report file to regenerate ; The browser opens and we are config.yaml The target station set by the configuration file , The scanning test will be carried out automatically ; A report will not be generated if it is terminated halfway ; 
边栏推荐
- Leetcode / Scala - sum of two numbers, three numbers, four numbers, and N numbers
- Build neural network from simple to deep
- Modeling essay series 150 SCLC engineering experiment 3-srule
- 十年架构五年生活-06 离职的冲动
- Machine learning by Li Hongyi 2. Regression
- System call capture and segmentation - RING3 layer LD_ Preload mechanism for library function hijacking
- 【万字长文】使用 LSM-Tree 思想基于.Net 6.0 C# 实现 KV 数据库(案例版)
- "Mongodb" mongodb high availability deployment architecture - replica set
- GA-RPN:引导锚点的建议区域网络
- 元宇宙GameFi链游系统开发NFT技术
猜你喜欢

【安徽大学】考研初试复试资料分享

。。。。。。

Application scheme of ankerui residual pressure monitoring system in residential quarter

大咖观点+500强案例,软件团队应该这样提升研发效能!

【附下载】一款强大的Web自动化漏洞扫描工具——Xray

System call capture and analysis conclusion making system call log collection system

3dunity game project actual combat - aircraft war

Redis database, which can be understood by zero foundation Xiaobai, is easy to learn and use!

Pyechart离线部署

Wulin headlines - station building expert competition
随机推荐
Record errors encountered by individuals
Back to the top of several options (JS)
测试用例千万不能随便,记录由一个测试用例异常引起的思考
外包干了四年,废了...
[communication principle] Chapter 2 -- deterministic signal
Wulin headlines - station building expert competition
【万字长文】使用 LSM-Tree 思想基于.Net 6.0 C# 实现 KV 数据库(案例版)
系统调用捕获和分析完结篇制作系统调用日志收集系统
最新心形拼图小程序源码+带流量主
Want the clouds in the picture to float? Video editing services can be achieved in three steps with one click
swagger2.9.2教程 与swagger3.0.0教程
安科瑞余压监控系统在住宅小区的应用方案
An online duplicate of a hidden bug
国内11所“袖珍”大学!在校园跑步,还没加速就出校门了...
Database composition storage engine
3dunity game project actual combat - aircraft war
Metauniverse gamefi chain game system development NFT Technology
Programmer growth chapter 28: how can managers not do it by themselves?
程序员成长第二十八篇:管理者如何才能不亲力亲为?
【云驻共创】为了写好代码,你坚持了哪些好习惯?