/Website-Scanner

Scan your website for vulnerabilities.Find website application vulnerabilites and fingerprint the target web application.

Primary LanguagePythonMIT LicenseMIT

Website-Scanner

Author : RKT

Description

This program is build on python.This python project can help to get website vulnerabilities and basic information.

Installation

  • Python
  • Figlet
  • Dnsutils
  • Bind9
  • Traceroute
  • Nmap

Getting started

git clone https://github.com/r3k4t/Website-Scanner.git
cd Website-Scanner
python website-scanner.py

Features

  • Ping
  • DNS Lookup
  • Ns Lookup
  • Reverse DNS Lookup
  • Port Scan
  • Whois Lookup
  • Geo-IP
  • Traceroute

Ping

Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available for virtually all operating systems that have networking capability, including most embedded network administration software.Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply. The program reports errors, packet loss, and a statistical summary of the results, typically including the minimum, maximum, the mean round-trip times, and standard deviation of the mean.

Ns Lookup

Nslookup is a network administration command-line tool available in many computer operating systems for querying the Domain Name System (DNS) to obtain domain name or IP address mapping, or other DNS records. The name "nslookup" means "name server lookup". nslookup operates in interactive or non-interactive mode. When used interactively by invoking it without arguments or when the first argument is - (minus sign) and the second argument is a hostname or Internet address of a name server, the user issues parameter configurations or requests when presented with the nslookup prompt (>). When no arguments are given, then the command queries the default server. The - (minus sign) invokes subcommands which are specified on the command line and should precede nslookup commands. In non-interactive mode, i.e. when the first argument is a name or Internet address of the host being searched, parameters and the query are specified as command line arguments in the invocation of the program. The non interactive mode searches the information for a specified host using the default name server

DNS Lookup

Find DNS records for domain,result are determined using the dig DNS tool.

Reverse Lookup

In computer networks, a reverse DNS lookup or reverse DNS resolution (rDNS) is the querying technique of the Domain Name System (DNS) to determine the domain name associated with an IP address – the reverse of the usual "forward" DNS lookup of an IP address[1] from a domain name.[2] The process of reverse resolving of an IP address uses PTR records. rDNS involves searching domain name registry and registrar tables. This may be used to try to identify the originator’s domain name to track, for example, a spammer sending spam emails or the domain name of a computer trying to break into a firewall or someone trying to hack the system. It may also be used to determine the name of the internet service provider assigned to a particular IP address. The reverse DNS database of the Internet is rooted in the .arpa top-level domain.

Although the informational RFC 1912 [3] (Section 2.1) recommends that "every Internet-reachable host should have a name" and that "for every IP address, there should be a matching PTR record," it is not an Internet Standard requirement, and not all IP addresses have a reverse entry.

Port Scan

A port scanner is an application designed to probe a server or host for open ports. Such an application may be used by administrators to verify security policies of their networks and by attackers to identify network services running on a host and exploit vulnerabilities.

A port scan or portscan is a process that sends client requests to a range of server port addresses on a host, with the goal of finding an active port; this is not a nefarious process in and of itself.[1] The majority of uses of a port scan are not attacks, but rather simple probes to determine services available on a remote machine.

To portsweep is to scan multiple hosts for a specific listening port. The latter is typically used to search for a specific service, for example, an SQL-based computer worm may portsweep looking for hosts listening on TCP port 1433.

Whois lookup

WHOIS (pronounced as the phrase "who is") is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system, but is also used for a wider range of other information. The protocol stores and delivers database content in a human-readable format. The current iteration of the WHOIS protocol was drafted by the Internet Society, and is documented in RFC 3912.

Geo-IP

Find the location of an IP address using the Geo-IP location tool.

Traceroute

Using mtr an advanced traceroute tool trace the path of an internet connection.

Screenshots

Screenshot at 2020-08-20 12-53-19

Screenshot at 2020-08-20 12-55-58

Screenshot at 2020-08-20 12-56-41

Screenshot at 2020-08-20 12-58-00

Screenshot at 2020-08-20 12-59-37

Screenshot at 2020-08-20 12-59-54