RealSPY_
Concurrency Debugger
2
MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1
400 XP

Hey Folks, this tutorial will be for beginners who want to hunt for bugs in web application but don’t have much skill yet. Actually before you don’t have good knowledge of bug hunting, you cannot opt for manual method so you have to take help of such automated tools which help you to detect bugs automatically. So let us discuss an automated bug hunter tool.
Let’s start

Pre-Installed
Skipfish is an active web application security reconnaissance tool that comes pre-installed in kali linux operating system. t prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes. e resulting map is then annotated with the output from a number of active (but hopefully
non-disruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments. You can activate this tool by execute the command below.
skipfish -h1skipfish-h

Let’s Pentest
All you need to do is provide the location of the “output” and the URL of that website on whichever website you want to hunt for the bug. Once the command is executed it will show some details of the attack which we can skip by pressing enter.
skipfish -o test http://testphp.vulnweb.com1skipfish-otest http://testphp.vulnweb.com

Details
Now here we can see all the details about the ongoing attack such as scan time, HTTP requests, reqs pending, issues etc.

Done


Hmm


Categorize
As you can see it categorizes all the vulnerabilities according to the impact with the colors. As we know how important the “Remote Code Execution” vulnerability is and according to it it has classified this vulnerability at the top. Looks perfect


Expand Documents
It shows vulnerabilities with payload so that we can directly exploit.

XSS
You can easily identify cross site scripting vulnerabilities in web applications even without finding any endpoints.

Triggered


Good

