.post-body q {color:yellow;} .post-body b {color:lightblue;} .post-body del, .post-body strike, .post-body i {color:lightgreen;} .post-body textarea {background-color:transparent;} #tombolPopOut { padding:3px 10px; display:inline-block; cursor:pointer; background-color:darkgreen; color:white; border:1px outset darkgreen; -moz-border-radius:13px; border-radius:13px; margin-top:5px; } #tombolPopOut:hover { background-color:green; color:darkred; border:1px outset green; } .PageList .widget-content ul li{display:inline-block; margin-left:10px;} .PageList h2{display:none} #uds-searchControl .gs-result .gs-title, #uds-searchControl .gs-result .gs-title *, #uds-searchControl .gsc-results .gsc-trailing-more-results, #uds-searchControl .gsc-results .gsc-trailing-more-results * { color:yellow; } #uds-searchControl .gs-result .gs-title a:visited, #uds-searchControl .gs-result .gs-title a:visited * { color:skyblue; } #uds-searchControl .gs-relativePublishedDate, #uds-searchControl .gs-publishedDate { color: lightgreen; } #uds-searchControl .gs-result a.gs-visibleUrl, #uds-searchControl .gs-result .gs-visibleUrl { color: #ccccdd; } #uds-searchControl .gsc-results { border-color: #6f6f6f; background-color: transparent; background-image: url(http://1.bp.blogspot.com/_bBL9ze_JZsw/TT_VysqlknI/AAAAAAAAAMs/OgtZMowV_m4/s1600/black50.png); -moz-border-radius:0px 5px 10px 10px; border-radius:0px 5px 10px 10px; } #uds-searchControl .gsc-tabhActive { border-color: #6f6f6f; border-top-color: #6f6f6f; background-color: transparent; background-image: url(http://1.bp.blogspot.com/_bBL9ze_JZsw/TT_VysqlknI/AAAAAAAAAMs/OgtZMowV_m4/s1600/black50.png); color: orange; } #uds-searchControl .gsc-tabhInactive { border-color: #6f6f6f; background-color: transparent; background-image: url(http://1.bp.blogspot.com/_bBL9ze_JZsw/TT_VysqlknI/AAAAAAAAAMs/OgtZMowV_m4/s1600/black50.png); color: green; } #uds-searchClearResults { border-color: #6f6f6f; } #uds-searchClearResults:hover { border-color: #6f6f6f; } #uds-searchControl .gsc-cursor-page { color: white; } #uds-searchControl .gsc-cursor-current-page { color: yellow; }

28 Mar 2012

Mencari kelemahan website/situs

Sebenarnya saya juga lum paham betul tool ini, tapi tidak ada salahnya kita berbagi dan mencobanya..demi audit keamanan situs kita..!!!
WebCruiser Web Vulnerability Scanner Enterprise v2.5.0adalah sebuah tools yang menguji dan mencari kelemahan website/situs..
Tool Mendukung POC (Proof of concept)terhadap kerentanan situs seperti: SQL Injection, Cross Site Scripting, XPath Injection dll. juga, WebCruiser juga adalah sebuah alat SQL injection otomatis, XPath injection tool, dan Cross Site Scripting
WebCruiser adalah alat untuk:
• SQL Injection Tool pertama untuk Windows 7, Windows Vista
• Web Vulnerability Scanner
• SQL Injection Scanner
• Cross Site Scripting Scanner
• XPath Injection Scanner
• Automatic SQL Injection Tool (POC)
• Cross Site Scripting Tool (POC)
• XPath Injection Tool (POC)
• Post Data Resend Tool
Fitur Webcruiser:
• Crawler(Site Directori dan File)
• Vulnerability Scanner: SQL Injection, Cross Site Scripting, XPath Injection dll.
• SQL Injection Scanner
• SQL Injection Tool: GET/Post/Cookie Injection POC(Proof of Concept)
• SQL Injection for SQL Server: PlainText/Union/Blind Injection
• SQL Injection for MySQL: PlainText/Union/Blind Injection
• SQL Injection for Oracle: PlainText/Union/Blind/CrossSite Injection
• SQL Injection for DB2: Union/Blind Injection
• SQL Injection for Access: Union/Blind Injection
• Post Data Resend
• Cross Site Scripting Scanner and POC
• XPath Injection Scanner and POC
• Auto Get Cookie From Web Browser For Authentication
• Report Output.
Download ==> DISINI

Comments Utility


Ar Yu ReDEY..?!