VulnX – CMS And Vulnerability Detection
VulnX tool is an automated tool used for various purposes in Penetration Testing. VulnX tool performs CMS and Vulnerabilities Detection on the target domain, this tool is said to be an intelligent auto shell injector tool. VulnX is popular due to its fast CMS detection and Faster Scanner. VulnX tool gathers information like Subdomains, IP addresses, Country, Origin, Timezone, Region, etc. VulnX tool is developed in Shell and Python language and it is available on the GitHub platform. This tool is free and open-source to use.
Features of VulnX Tool
- VulnX tool performs CMS Detection like WordPress, Joomla, Drupal, etc.
- VulnX tool performs Information Gathering like Subdomains collection, Country Information, IP Addresses collection, etc.
- VulnX tool is a Multi-Threaded tool.
- VulnX tool supports Vulnerabilities Scanning on the target domain.
- VulnX tool has Auto Shell Injector.
- VulnX tool performs Exploit Dork Searcher on the target.
Installation of VulnX Tool on Kali Linux OS
Step 1: Use the following command to install the tool in your Kali Linux operating system.
git clone https://github.com/anouarbensaad/vulnx.git
Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.
cd vulnx
Step 3: Change the permissions of install.sh file by using the following command.
sudo chmod +x install.sh
Step 4: Run the below command to verify the installation.
./install.sh
Step 5: Launching the tool by using the following command.
vulnx -h
Working with VulnX Tool on Kali Linux OS
Example 1: Sample commands: cms-gathering = all, -d subdomains-gathering, run – exploit
vulnx -u http://w3wiki.net -l all -d -w --exploit
In this example, we are using the sample commands for collecting cms information, subdomains gathering, etc.
Example 2: Search single target site
vulnx -u http://w3wiki.net
In this example, we are scanning a single target domain http://w3wiki.net.
Example 3: Run exploit module
vulnx -u http://w3wiki.net --exploit
In this example, we are running an exploit module against http://w3wiki.net
Example 4: CMS Information Collection
vulnx -u http://w3wiki.net --cms
In this example, we are collecting the information of CMS on the target domain.
Example 5: Subdomain & IP information collection
vulnx -u http://w3wiki.net --domain-info
In this example, we are collecting Subdomain & IP information.
Example 6: Web site information collection
vulnx -u http://w3wiki.net --web-info
In this example, we are collecting Web information like OS and Server details.
Example 7: Scan for open ports
vulnx -u http://w3wiki.net --ports 443
In this example, we are checking the activeness of the port on the domain server.
Example 8: DNS information collection
vulnx -u http://w3wiki.net --dns
In this example, we are collecting DNS information.