Scan: Scan a network trying to locate Docker Registries.
Registry
Delete: Delete remote image / tag
Info: Show info from remote registry
Push: Push an image (like Docker client)
Upload: Upload a random file
Image
Analyze: Looking for sensitive information in a Docker image.
Looking for passwords in environment vars.
Try to find any URL / IP in the environment vars.
Try to deduce the user used internally to run the software. This is not trivial. If the entry point is a .sh file. Read the file and try to find call to sudo-like: “sudo”, “gosu”, “sh -u”… And report the user found.
Extract: extract a docker image
Info: Get a image meta information
Modify:
entrypoint: change the entrypoint in a docker
trojanize: inject a reverser shell into a docker image
A little tool for local and remote file inclusion auditing and exploitation.
Fimap is a little python tool which can find, prepare, audit, exploit
and even google automaticly for local and remote file inclusion bugs in
webapps. fimap should be something like sqlmap just for LFI/RFI bugs instead of sql injection. It's currently under heavy development but it's usable.
The goal of fimap is to improve the quality and security of your website.
What works currently?
Check a Single URL, List of URLs, or Google results fully automaticly.
Can identify and exploit file inclusion bugs.
Relative\Absolute Path Handling.
Tries automaticly to eleminate suffixes with Nullbyte and other methods like Dot-Truncation.
Download Link : https://code.google.com/p/fimap/downloads/list
Uniscan:
is a simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner.
Uniscan is a Remote File Include and Local File Include and Remote Command Execution vulnerability scanner.
This tool identify six vulnerability :-
* Blind SQL-Injection
* Remote File Include (RFI)
* Local File Include (LFI)
* Remote Command Execution (RCE)
* Cross-Site Scripting (XSS)
* SQL-Injection (SQL-i)
Download Link : http://sourceforge.net/projects/uniscan/
Darkjumper.py:
This tool will try to find every website that host at the same server at your target
Then check for every vulnerability of each website that host at the same server.
Download Link : http://sourceforge.net/projects/darkjumper/
Simple Local File Inclusion:
Description
The Simple Local File Inclusion Exploiter helps you to exploit LFI
vulnerabilities. After you found one, simply pass the URL of the
affected website and the vulnerable parameter to this tool. You can also
use this tool to scan a parameter of an ULR for a LFI vulnerability.
Usage example
./lfi_sploiter.py –exploit-url=http://www.example.com/page.php?file=main –vulnerable-parameter=file
Usage notes
- Always use http://….
- When you pass a vulnerable parameter, this tool assumes that it is really vulnerable.
- If you do not know if a parameter is vulnerable, simply pass it to this script and let the scanner have a look.
- Only use one vulnerable parameter at once.
- This tool does not work with SEO URLs, such as http://www.example.com/news-about-the-internet/.
- If you only have a SEO URL, try to find out the real URL which contents parameters.
Feature list
- Provides a random user agent for the connection.
- Checks if a connection to the target can be established.
- Tries catch most errors with error handling.
- Contains a LFI scanner (only scans one parameter at once).
- Finds out how a LFI vulnerability can be exploited (e.g. directory depth).
- Supports nullbytes!
- Exploit features: Dumps a list of interesting files to your hard disk.
- Supports common *nix targets, but no Windows systems.