There are over ,000 remotely vulnerabilities that exist in tons of /front-ends and could allow an attacker to completely compromise the back-end server. These vulnerabilities range from RCE to malicious file uploads to SQL injection to RFI/LFI etc.

is built to quickly scan the network for such applications thus serving pwnable targets on a silver platter.

r :: If you want Yasuo to perform a port scan, use this switch to provide an IP address or IP range

l :: If you want Yasuo to perform a port scan, use this switch to provide an input file with new-line separated IP addresses, similar to nmap’s -iL option

-s :: Provide custom signature file. [./yasuo.rb -s mysignatures.yaml -f nmap.xml] [Default – signatures.yaml]

f :: If you do not want Yasuo to perform a port scan and already have an nmap output in XML format, use this switch to feed the nmap output

u :: Takes a newline-separated file of URLs saved from the previous run of Yasuo. 

n :: Tells Yasuo to not ping the host while performing the port scan. Standard nmap option.

p :: Use this switch to provide port number(s)/range

A :: Use this switch to scan all the 653 ports. Standard nmap option.

-b [all/form/basic] :: If the discovered application implements authentication, use this switch to brute-force the auth. “all” will brute-force both form & HTTP basic auth. “form” will only brute-force form-based auth. “basic” will only brute-force HTTP basic auth.

t :: Specify the maximum number of threads

Source link


Please enter your comment!
Please enter your name here