• We just launched and are currently in beta. Join us as we build and grow the community.

Rengine – A GUI Based Scanner for Web Application

CabbageOwa

Anime Fan Theorist
C Rep
0
0
0
Rep
0
C Vouches
0
0
0
Vouches
0
Posts
79
Likes
52
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 400 XP
Forest-with-Path-Wide-Presentation.png


Hey Folks, in this tutorial we are going to talk about an (GUI) based vulnerability scanner tool. This tool is specifically designed to find open ports, technology and hidden directories in websites. It uses the same tools that we are using during website scanning and enumeration, but the difference will be that with this tool we can see attacks with (GUI) interfaces.

Requirements

Kali Linux

Lets take a look 🙂 !!

Installation

Installation is quite simple but we need to meet some requirements of this tool. First, we download the tool from github using the following command. We need to go to the directory after which we will install some other tools.

git clone https://github.com/yogeshojha/rengine.git
cd rengine
ls123git clone
https://github.com/yogeshojha/rengine.gitcd renginels

1-20.png


We have to download the docker using the following command. Which is necessary for the tool.

apt install docker.io1apt install docker.io

2-24.png


As well as we need to download the composer that will help us to compose our files into the docker.

apt install docker-compose1apt install docker-compose

3-19.png


The installation is almost done, now we will start and enable docker using the following command.

systemctl start docker
systemctl enable docker12systemctl start dockersystemctl enable docker

4-19.png


Now all we need to do is execute the following command and it will automatically install all the necessary servers and files and build a vulnerability scanner without much effort.

docker-compose up --build1docker-compose up--build

5-19.png


This may take some time but after the process is complete we can check the location of our web server by the ps command.

docker ps1docker ps

6-18.png


We are all done, now we need to create username and password for login (GUI).

docker exec -it rengine_web_1 python manage.py createsuperuser1docker exec-it rengine_web_1 python manage.py createsuperuser

7-14.png


Execute the following location in the terminal and login into the scanner. Interface and usage of this tool is quite easy, just follow our instructions and enter your first target in the input field.

8-13-1024x454.png


After submitting the target, you will reach the target list in which you have to click on the highlighted icon.

9-10-1024x407.png


Here we can select the option as per need but for the first attempt we will choose full scan option.

10-10-1024x454.png


Scanning has started and click on the view option to see the results.

11-11-1024x422.png


As you can see it can give us results related to open ports, technology and more. But the important thing is that it does not provide us the vulnerability of open ports.

12-9-1024x348.png


Further it also provide us the subdomain list of the target.

13-6.png


Even we can export the subdomain list in txt file.

14-5-1024x350.png


If we want to scan multiple domains at one time then we can use txt file.

15-3-1024x288.png


In this tutorial, we have included all the features of this tool which can help in our work but similarly you can see all the features of this tool in your terminal.

16-2.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

440,010

316,559

316,568

Top