Working with Scant3R Tool on Kali Linux
Example 1: Using Scant3R Tool for Normal scan
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py
Example 2: Using Scant3R Tool to Add module
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py -m headers
Example 3: Using Scant3R Tool to add Random User-agents
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py -R
Example 4: Using Scant3R Tool Add custom headers
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py -H “Auth: U2NhblQzcgo=\nNew: True”
Example 5: Using Scant3R Tool Add timeout
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py -t 1000
Example 6: Using Scant3R Tool Add threads
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py -w 50
Example 7: Using Scant3R Tool Add http/https proxy
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py -p http://127.0.0.1:80
Example 8: Using Scant3R Tool Add cookies
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py -c ‘login=test%2Ftest’
Example 9: Using Scant3R Tool to Follow redirects
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py -r
Example 10: Using Scant3R Tool to Dump HTTP requests/responses
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py -H “Auth: U2NhblQzcgo=” -d
Example 11: Using Scant3R Tool to Remove logo
echo “http://testphp.vulnweb.com/search.php?test=query&searchFor=1&goButton=go” | python3 scant3r.py –nologo
Example 12: Using Scant3R Tool to use PMG Module
cat waybackurls.txt | python3 scant3r.py -m PMG
Example 13: Using Scant3R Tool to use Headers Module
echo https://testphp.vulnweb.com|python3 scant3r.py -m headers
Example 14: Using Scant3R Tool to use Lorsrf Module
echo ‘http://testphp.vulnweb.com/’ | python3 scant3r.py -m lorsrf -w 50 -R -x ‘http://myhost.burpcollaborator.net’
Example 15: Using Scant3R Tool to use Paths Module
echo ‘http://testphp.vulnweb.com/’| python3 scant3r.py -m paths -w 50
Example 16: Using Scant3R Tool to use Neon Module
echo http://$$$$$.com/admin/ | python3 scant3r.py -m neon
Scant3R – Web Security Scanner
Vulnerability Scanning is the process of finding the security flaws in the web-based application which can compromise the web application and reveal sensitive data. Scanning can be done in a manual way as well as in an automated way. Manual testing takes a lot of time if the scope of the target domain is vast. So automated testing is a good approach to be followed. Scant3rR is an automated tool developed in the python language which tests the target domain for various types of vulnerabilities or flaws like XSS, Injection, LFI, etc. The tool contains various modules which can be used in the scanning process. Scant3R tool is open source and free to use.
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux