Hacking Articles Part 28

27 3 0
                                        

Kali Linux – Reporting Tools

[Disclaimer: The content of this article is for educational purposes only. It was written to help readers test their skills on using computers and/or Kali Linux and share knowledge about Kali Linux to the users. The writer of this article/guide take no responsibility for actions resulting from the inappropriate usage of informations contained of this article/guide.]

We are now in the part 28 and after this one, there will be only 2 parts left and that was the time that hacking articles will be gone and new articles series will be born, let's get into it now!

"MAGNI NOMINIS UMBRA"

Dradis

-This one is a web service

But how can we use Dradis?

Step 1: Type "service dradis start" first

Step 2: Go to Applcations -> Reporting Tools -> dradis then the web URL will open and anybody in the LAN can open it in the following URL of kali machine: 3004. You just need to log in with the username and password that was used for the first time.

Step 3: After logging in, you can import files from NMAP, NESSUS, NEXPOSE. To do this one, go to "Import from file" -> click "new importer (with real-time feedback)".

Step 4: Select the file type that you want to upload and click "Browse ".

And if you go to the home page now, on the left panel you will see that the imported scans have are in a folder with their best host and port details.

Metagoofil

-This one performs a search in Google to identify and download the documents to the local disk and then extracts the metadata. It also extracts metadata of public documents belonging to a specific company, individual, object, etc.

To open this one, go to usr/share/metagoofil by typing "cd/usr/share/metagoofil" in the terminal.

To start searching, type "python metagoofil.py"

Note: You can use the following parameters with this command:

-d (domain name)

-t (filetype to download dox,pdf,etc.)

-l (limit the results 10, 100)

-n (limit files to download)

-o (location to save the files)

-f (output file)

And the following example shows only the domain name is hidden. (Picture Below)

Okay guys, 2 more parts to go and I hope you like this one and if you have questions regarding to the tools that we can use in Kali Linux, just comment below and I will try to answer all of the questions from our readers

Oops! This image does not follow our content guidelines. To continue publishing, please remove it or upload a different image.

Okay guys, 2 more parts to go and I hope you like this one and if you have questions regarding to the tools that we can use in Kali Linux, just comment below and I will try to answer all of the questions from our readers. Thank You!!

Hacking ArticlesWhere stories live. Discover now