<head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1">
<title>kali工具箱</title>
<script src="./static/bootstrap.min.js"></script>
<link rel="stylesheet" href="./static/main.css">
<link rel="stylesheet" href="./static/bootstrap.min.css">
<style type="text/css" id="syntaxhighlighteranchor"></style>
</head>
<main class="main-container ng-scope" ng-view="">
<div class="main receptacle post-view ng-scope">
<article class="entry ng-scope" ng-controller="EntryCtrl" ui-lightbox="">
<section class="entry-content ng-binding" ng-bind-html="postContentTrustedHtml">
<h2> WebSploit包装说明</h2><p style="text-align: justify;"> WebSploit是一个开源的项目为： </p><ul><li>社会工程工作</li><li>扫描，履带及分析网站</li><li>自动开拓者</li><li>支持网络攻击</li><li> Autopwn - 从使用的Metasploit对于扫描及开发目标服务</li><li> WMAP - 扫描，履带目标从使用Metasploit的WMAP插件</li><li>格式传播者 - 反向注入和绑定的有效载荷送入文件格式</li><li> phpMyAdmin的扫描仪</li><li> CloudFlare的解析器</li><li> LFI旁路器</li><li> Apache的用户扫描仪</li><li>迪尔Bruter </li><li>管理员发现者</li><li> MLITM攻击 - 人留在中东，XSS钓鱼攻击</li><li> MITM - 中间人攻击</li><li> Java小程序的攻击</li><li> MFOD攻击媒介</li><li> USB感染攻击</li><li> ARP DOS攻击</li><li>网络杀手攻击</li><li>假更新攻击</li><li>假冒接入点攻击</li><li>无线蜜罐</li><li>无线干扰器</li><li>无线上网该做什么</li><li>蓝牙POD攻击</li></ul><p>资料来源：http://sourceforge.net/projects/websploit/ <br> <a href="http://sourceforge.net/projects/websploit/" variation="deepblue" target="blank">WebSploit首页</a> | <a href="http://git.kali.org/gitweb/?p=packages/websploit.git;a=summary" variation="deepblue" target="blank">卡利WebSploit回购</a> </p><ul><li>作者：Fardin Allahverdinazhand </li><li>许可：GPLv3的</li></ul><h3>包含在websploit包工具</h3><h5> websploit - 该Websploit框架</h5><p>该Websploit框架。 </p><h3> websploit用法示例</h3><code><a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="d4a6bbbba094bfb5b8bd">[email&#160;protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script>:~# websploit <br>
WARNING: No route found for IPv6 destination :: (no default route?)<br>
<br>
     __          __  _               _       _ _   <br>
     \ \        / / | |             | |     (_) |  <br>
      \ \  /\  / /__| |__  ___ _ __ | | ___  _| |_ <br>
       \ \/  \/ / _ \ '_ \/ __| '_ \| |/ _ \| | __|<br>
        \  /\  /  __/ |_) \__ \ |_) | | (_) | | |_ <br>
         \/  \/ \___|_.__/|___/ .__/|_|\___/|_|\__|<br>
                              | |                  <br>
                              |_|                  <br>
<br>
        --=[WebSploit FrameWork<br>
    +---**---==[Version :2.0.5 BETA<br>
    +---**---==[Codename :We're Not Crying Wolf<br>
    +---**---==[Available Modules : 19<br>
        --=[Update Date : [r2.0.5-000 2.3.2014]<br>
<br>
<br>
<br>
wsf &gt; use web/dir_scanner<br>
wsf:Dir_Scanner &gt; set TARGET http://192.168.1.202<br>
TARGET =&gt;  192.168.1.202<br>
wsf:Dir_Scanner &gt; run<br>
[*] Your Target : 192.168.1.202<br>
[*]Loading Path List ... Please Wait ...<br>
[index] ... [400 Bad Request]<br>
[images] ... [400 Bad Request]<br>
[download] ... [400 Bad Request]<br>
[2006] ... [400 Bad Request]<br>
[news] ... [400 Bad Request]<br>
[crack] ... [400 Bad Request]</code><div style="display:none">
<script src="//s11.cnzz.com/z_stat.php?id=1260038378&web_id=1260038378" language="JavaScript"></script>
</div>
</main></body></html>
