31 C
Jaipur
Friday, October 30, 2020

Yuki Chan – Automated Penetration Testing and Auditing Tool

Must read

Xiaomi Trumps Apple to Become the Third Best Smartphone Maker Globally

The third quarter saw the smartphone market recover after taking massive hits due to the COVID-19 pandemic earlier this year. Samsung again came out...

Call Of Duty Warzone Mobile Might Become A Reality, Confirms Activision

A while back, Activision put out a job listing with its description saying “WZM,” which clearly meant Warzone Mobile. Ever since then, Call of...

SmartThings Find Locates Your Lost or Misplaced Galaxy Devices

Samsung has launched SmartThings Find, a new service in SmartThings app to help locate your misplaced or stolen Galaxy devices. The app uses Bluetooth...

10 Best Apple Mail Alternatives for Mac and iPhone in 2020

Unlike other stock apps like Safari and Notes, Apple Mail for macOS hasn’t got major improvements for a long time. The email app not...

Yuki Chan is an Automated  Penetration Testing tool that will be auditing all standard security assessment for you. It is one of the Best Penetration testing Tool which provides many Integrated Security Tools and Performing Many Penetration testing Operation into Target Network.

There are more than  15 Modules has been Integrated with Yuki chan and it is one of the most powerful tools for Auditing the network.

Number Of Modules

  • Whois domain analyzer
  • Nslookup
  • Nmap
  • TheHarvester
  • Metagoofil
  • DNSRecon
  • Sublist3r
  • Wafw00f
  • WAFNinja
  • XSS Scanner
  • WhatWeb
  • Spaghetti
  • WPscan
  • WPscanner
  • WPSeku
  • Droopescan ( CMS Vulnerability Scanner WordPress, Joomla, Silverstripe, Drupal, And Moodle)
  • SSLScan
  • SSLyze
  • A2SV
  • Dirsearch

Yuki Chan Futures

  • Automated
  • Intel-Gathering
  • Vulnerability Analysis
  • Security Auditing
  • OSINT
  • Tracking
  • System Enumeration
  • Fuzzing
  • CMS Auditing
  • SSL Security Auditing
  • And Off Course This Tool Designed For Targeted Pentesting Too

How to do Penetration Testing your Network with Yuki Chan

Initially, Download Yuki Chan from   GitHub Clone.  —>> Download

The first Step we need to Download and Install the Yuki Chan.

Ok. in my recent OS (Kali Linux) has been already installed this module

  • Nmap
  • Wafw00f
  • WPScan
  • SSLScan
  • SSLyze

So if your OS doesn’t have it then you can install it first here I give you resources.

Red Hat, Fedora, Mandrake, and Yellow Dog Linux with Yum

#yum install nmap

Debian Linux and Derivatives such as Ubuntu

#apt-get install nmap

#git clone https://github.com/EnableSecurity/wafw00f.git

#cd wafw00f

#python setup.py install

or simple way

#pip install wafw00

#git clone https://github.com/wpscanteam/wpscan.git

#cd wpscan

#sudo gem install bundler && bundle install –without test

#git clone https://github.com/nabla-c0d3/sslyze.git

Yuki Installation Process

Let go and Install the Yuki.

#cd Desktop

#git Clone https://github.com/Yukinoshita47/Yuki-Chan-The-Auto-Pentest

Later Give Chmod 777 Access Level

#chmod 777 wafninja joomscan install-perl-module.sh yuki.sh

And Then Install Python Module

#pip install -r requirements.txt

Once Complete an all the Requirements then Launch the Yuki

preparation finished now run this tool.

#./yuki.sh

Once Launch the Tool Then Enter you Target Website that you want to do Penetration Testing.

Here I have used “exploit-db.com”

Once Click you Enter Button Yuki Will getting Start to Scan you Entire Target Network and Give you a Tons of Valuable Information to you by helping of its Integrated Security Tools

In this Result, We can able the Gathering the Information about the Target network using Whois Lookup.

Nex one Nmap Will Start it Process to Scan the Target Website and its Provide the Information about the open Ports and other related information.

Next theharvester will Provide to Penetration testers in the early stages of the penetration test in order to understand the customer footprint on the Internet. It is also useful for anyone that wants to know what an attacker can see about their organization.

Following theHarvester , Many Tools are Performing an Auditing Against the Target and Provide you a complete Result.

Here i have used our Website “gbhackers.com” for testing Purpose.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates.

Source link

- Advertisement -

More articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest article

Xiaomi Trumps Apple to Become the Third Best Smartphone Maker Globally

The third quarter saw the smartphone market recover after taking massive hits due to the COVID-19 pandemic earlier this year. Samsung again came out...

Call Of Duty Warzone Mobile Might Become A Reality, Confirms Activision

A while back, Activision put out a job listing with its description saying “WZM,” which clearly meant Warzone Mobile. Ever since then, Call of...

SmartThings Find Locates Your Lost or Misplaced Galaxy Devices

Samsung has launched SmartThings Find, a new service in SmartThings app to help locate your misplaced or stolen Galaxy devices. The app uses Bluetooth...

10 Best Apple Mail Alternatives for Mac and iPhone in 2020

Unlike other stock apps like Safari and Notes, Apple Mail for macOS hasn’t got major improvements for a long time. The email app not...

Indian Army Launches Atmanirbhar Secure Messaging App ‘SAI’ for Soldiers

The Indian Army has decided to bolster its soldiers’ security by building a WhatsApp-like secure messaging app as part of the Atmanirbhar Bharat campaign....