From 19412e60158b6378432f3503936dc19797282bcd Mon Sep 17 00:00:00 2001 From: karmaz95 Date: Sun, 21 Mar 2021 22:09:22 +0100 Subject: [PATCH] Patch --- README.md | 7 +++++-- crimson_target | 3 +-- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 43e2a2c..70ed083 100644 --- a/README.md +++ b/README.md @@ -41,13 +41,16 @@ Install Burp Suite ./crimson_recon "domain.com" ``` -* If you are interested in how this module works, I encourage you to study the source code. I tried to describe in the comments how the individual tools work. -* Additionally, you can learn more by reading my article at [medium](https://karol-mazurek95.medium.com/automation-of-the-reconnaissance-phase-during-web-application-penetration-testing-i-574fd9dce53e) +* If you are interested in how this module works, I encourage you to study the source code. I tried to describe in the comments how the individual tools works. +* Additionally, you can learn more about `crimson_recon` module by reading my article at [medium](https://karol-mazurek95.medium.com/automation-of-the-reconnaissance-phase-during-web-application-penetration-testing-i-574fd9dce53e) ##### :diamonds: Second module needs `subdomain name`. You can additionally put `authorization cookie` :diamonds: ```bash ./crimson_target -d "example.domain.com" -c "Cookie: auth1=123;" ``` +* If you are interested in how this module works, I encourage you to study the source code. I tried to describe in the comments how the individual tools works. +* Additionally, you can learn more about `crimson_target` module by reading my article at [medium](https://karol-mazurek95.medium.com/automation-of-the-reconnaissance-phase-during-web-application-penetration-testing-ii-4336bd4ca73b?sk=ba289442112704cd71ac4a89e994fc8c) + ##### :diamonds: Third module needs `subdomain name` with your `collaborator` and `vps ip`. You can additionally put `authorization cookie` :diamonds: ```bash ./crimson_exploit -D "example.domain.com" -c "Cookie: auth1=123;" -d "collaborator.com" -i "ip" diff --git a/crimson_target b/crimson_target index 6e78686..cade954 100755 --- a/crimson_target +++ b/crimson_target @@ -1,7 +1,5 @@ #!/bin/bash # TO DO: -# TRANSFER: VULNERABILITY SCANNERS TO 3RD MODULE ( nikto / wapiti ) -# ADD BRUTESPRAY # Make better printer ### FUNCTIONS # @@ -16,6 +14,7 @@ # 9. PREPARE params.txt FOR EXPLOIT MODULE # 10. PREPARE dirs.txt FOR EXPLOIT MODULE # 11. CHECK WAF +# 12. CHECK BACKUP FILES # ### LISTS: #