• We just launched and are currently in beta. Join us as we build and grow the community.

Sitadel – Web Application Security Scanner

N0P

Digital Influence Strategist
N Rep
0
0
0
Rep
0
N Vouches
0
0
0
Vouches
0
Posts
120
Likes
74
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
Colorful-Cute-3d-Illustrations-Trivia-Pear-Deck-Education-Presentation.png


Hey Folks, in this tutorial we are going to add another web application security scanner tool to our bug bounty tools list called “Sitadel”. Sitadel is basically an update for WAScan making it compatible for python >= 3.4 It allows more flexibility for you to write new modules and implement new features .

Features
  • Content Delivery Network detection
  • Define Risk Level to allow for scans
  • Plugin system
  • Docker image available to build and run

Excited so let’s get started 😛 !!

Installation of Sitadel

So this time we are going to follow the easiest way to install this tool. See 🙂 !! Git utility comes pre-installed in every debian system so we can download any tool using “git clone” command. After downloading the project from github we have to install another utility in our system called “pip“. Now until the utility is downloaded, we can give our mind some rest 😛 !!

git clone https://github.com/shenril/Sitadel.git
cd Sitadel
apt install pip
pip install .
pip3 install .12345git clone
https://github.com/shenril/Sitadel.gitcd Sitadelapt install pippip install.pip3 install.

1.png


Great 😛 !! That’s all and now we can operate this tool very snugly even without any issues. Let us start to explore the goodies of this tool by using its features one by one.

python sitadel.py --help1python sitadel.py--help

2.png

Missing Security Headers

In simple words only you need to enter the name of the domain which you want to get the information and it will show you all the details on the terminal. As you can see for example in the image below that when we provide a domain and it first gives us that number of security headers which are not available on the web application.

python3 sitadel.py https://secnhack.in1python3 sitadel.py https://secnhack.in

3.png

CMS and WAF Detection

We try many different tools just to see these things but this has dumped both useful stuff in just a second.

4.png

Increase Risk Level

Basically the risk level feature given by this tool is only being used for detecting the more useful stuff from the web application.

python3 sitadel.py https://secnhack.in --risk 21python3 sitadel.py https://secnhack.in --risk 2

5.png

Custom User Agent

This is very useful for every penetration tester to make themselves completely secure and these same features come together to hide their true identity. As you can see we have entered fake user agent details so that each request is recorded on the victim web server log as “secnhack .1.1“.

python3 sitadel.py http://192.168.1.11 -ua "secnhack 1.1."1python3 sitadel.py http://192.168.1.11 -ua "secnhack 1.1."

6.png


BOOOOM 😛 !! We did it and as you can see each log is coming with the same user agent we set up on the attacking terminal.

7.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

428,096

310,989

310,998

Top