This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP VBScan Project"
(→News and Events) |
|||
(86 intermediate revisions by 2 users not shown) | |||
Line 4: | Line 4: | ||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
− | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | + | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | |
+ | [[file:VBScan_Logo.png|right]] | ||
− | <span | + | <div class="plainlinks"> |
− | + | '''Share this:''' | |
− | + | <span title="Share via e-mail" class="plainlinks">[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]</span> | |
+ | <span title="Share on Facebook">[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&t={{urlencode:{{FULLPAGENAME}}}}]]</span> | ||
+ | <span title="Share on Digg">[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&title={{urlencode:{{FULLPAGENAME}} }}]]</span> | ||
+ | <span title="Share on delicious">[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&title={{urlencode:{{FULLPAGENAME}}}}]]</span> | ||
+ | <span title="Share on reddit">[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&title={{urlencode:{{FULLPAGENAME}}}}]]</span> | ||
+ | <span title="Share on StumbleUpon">[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&title={{urlencode:{{FULLPAGENAME}}}}]]</span> | ||
+ | <span title="Share on LinkedIn">[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&url={{fullurle:{{FULLPAGENAME}}}}&title={{urlencode:{{FULLPAGENAME}}}}]]</span> | ||
+ | <span title="Share on Twitter">[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]</span> | ||
+ | <span title="Seed on Newsvine">[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&u={{fullurle:{{FULLPAGENAME}}}}]]</span> | ||
+ | </div> | ||
+ | |||
+ | [[File:joomscan_download.png|link=https://github.com/rezasp/vbscan/releases]] | ||
+ | |||
+ | ==OWASP VBScan Project == | ||
+ | OWASP VBScan (short for [VB]ulletin Vulnerability [Scan]ner) is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them. | ||
+ | |||
+ | |||
+ | ==== Why VBScan ? ==== | ||
+ | |||
+ | If you want to do a penetration test on a vBulletin Forum, VBScan is Your best shot ever! This Project is being faster than ever and updated with the latest VBulletin vulnerabilities. | ||
+ | |||
+ | [[File:vbscan_screenshot.jpg]] | ||
− | |||
− | |||
− | + | ==== Popularity ==== | |
− | + | * ToolsWatch Annual Best Free/Open Source Security Tool Survey: | |
− | + | ** 2016 [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ 3rd] | |
− | |||
==Description== | ==Description== | ||
<span style="color:#ff0000"> | <span style="color:#ff0000"> | ||
− | VBScan is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them | + | OWASP VBScan (short for [VB]ulletin Vulnerability [Scan]ner) is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them. |
− | |||
− | |||
− | |||
− | + | {| | |
+ | |- | ||
+ | {{#ev:youtube|NGEtJoGL2yA}} | ||
+ | {{#ev:youtube|SirozqDYERA}} | ||
+ | |} | ||
==LICENSE== | ==LICENSE== | ||
Line 43: | Line 63: | ||
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. | ||
− | |||
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
| valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | ||
− | == | + | == Quick Download == |
− | + | [https://github.com/rezasp/vbscan Github Page.] | |
− | |||
− | |||
− | + | [Download Page.] | |
− | [https://github.com/ | + | * [https://github.com/rezasp/vbscan/zipball/master .zip file.] |
+ | * [https://github.com/rezasp/vbscan/tarball/master .tgz file.] | ||
− | + | == Project Leader == | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | [ | + | [mailto:reza.[email protected] Mohammad Reza Espargham] |
− | + | == Contributors & Main Developers == | |
− | |||
− | + | * [https://github.com/TahaDaneshnia Taha Daneshnia] | |
− | + | * [https://github.com/saturn99 saturn99] | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
==Classifications== | ==Classifications== | ||
Line 102: | Line 103: | ||
| valign="top" style="padding-left:25px;width:200px;" | | | valign="top" style="padding-left:25px;width:200px;" | | ||
− | = | + | == News and Events == |
− | |||
− | |||
− | |||
− | |||
+ | * VBScan 0.1.8 - "Self Challenge" Released | ||
+ | * OWASP VBScan was introduced in OFFSECONF 2017 | ||
+ | * [http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/ OWAPS VBScan came third in the Top Security Tools of 2016 as voted by ToolsWatch.org readers] | ||
+ | * VBScan 0.1.7.1 - "Larry Wall" Released | ||
+ | * VBScan 0.1.7 - "Larry Wall" Released | ||
+ | * OWASP VBScan has been selected for BSides/BlackHat USA 2016 | ||
+ | * VBScan 0.1.6 - "Dennis Ritchie again" Released | ||
+ | * VBScan 0.1.5 - "Dennis Ritchie" Released | ||
+ | |} | ||
= Acknowledgements = | = Acknowledgements = | ||
==Contributors== | ==Contributors== | ||
− | + | VBScan source code located in github and you could see contributors in this [https://github.com/rezasp/vbscan/graphs/contributors URL]. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | Please feel free to fork and submit your pull request to develop VBScan Project together. | |
− | + | ==Leader== | |
− | * [https://www.owasp.org/index.php/User: | + | * [https://www.owasp.org/index.php/User:rezasp Mohammad Reza Espargham] |
− | |||
− | |||
= Road Map and Getting Involved = | = Road Map and Getting Involved = | ||
− | This project is going to be the best VBulletin | + | This project is going to be the best VBulletin scanner, At the end We could have a forum cms penetration tester which is updated with the last vulnerabilities. |
− | + | ==Roadmap== | |
− | |||
− | |||
− | |||
− | |||
− | + | This Project was created to be a VBScanner which already it is and now need to be best with some tasks: | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | * Optimize software core to be fast and easy to develop | |
− | + | * make it module base and create libraries for developers | |
− | * | + | * Support all OS |
− | * | + | * Be update with latest exploits. |
− | * | + | * Create documents for newbie users |
− | + | * Keep testing and fix bugs! | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
===Feedback=== | ===Feedback=== | ||
− | Please | + | Please submit your feedbacks and issues in [https://github.com/rezasp/vbscan/issues HERE]. |
<ul> | <ul> | ||
<li>What do like?</li> | <li>What do like?</li> | ||
<li>What don't you like?</li> | <li>What don't you like?</li> | ||
<li>What features would you like to see prioritized on the roadmap?</li> | <li>What features would you like to see prioritized on the roadmap?</li> | ||
+ | <li>Do you have any problem with tool?</li> | ||
+ | <li>Do you need any exploit to be add?</li> | ||
</ul> | </ul> | ||
=Minimum Viable Product= | =Minimum Viable Product= | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | VBScan Could be improved by adding more module and fixing core to make a better and faster threads, right now VBScan is including more than 70 modules to check bugs, vulnerabilities in perl language. To be more update and check exploits please check the [https://github.com/rezasp/vbscan github page]. | |
+ | |||
+ | =Project About= | ||
− | |||
− | + | {{:Projects/OWASP_VBScan_Project}} | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
− | __NOTOC__ <headertabs /> | + | __NOTOC__ <headertabs /> |
+ | |||
+ | [[Category:OWASP Project]] [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Tool]] [[Category:OWASP_Download]] |
Latest revision as of 20:00, 17 September 2018
OWASP VBScan ProjectOWASP VBScan (short for [VB]ulletin Vulnerability [Scan]ner) is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them.
Why VBScan ?If you want to do a penetration test on a vBulletin Forum, VBScan is Your best shot ever! This Project is being faster than ever and updated with the latest VBulletin vulnerabilities.
Popularity
Description
OWASP VBScan (short for [VB]ulletin Vulnerability [Scan]ner) is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them.
LICENSEGNU GENERAL PUBLIC LICENSE , Version 3, 29 June 2007Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/ Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Click to see the full license
The OWASP Security Principles are licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one. |
Quick Download[Download Page.] Project LeaderContributors & Main Developers
Classifications |
News and Events
|
Contributors
VBScan source code located in github and you could see contributors in this URL.
Please feel free to fork and submit your pull request to develop VBScan Project together.
Leader
This project is going to be the best VBulletin scanner, At the end We could have a forum cms penetration tester which is updated with the last vulnerabilities.
Roadmap
This Project was created to be a VBScanner which already it is and now need to be best with some tasks:
- Optimize software core to be fast and easy to develop
- make it module base and create libraries for developers
- Support all OS
- Be update with latest exploits.
- Create documents for newbie users
- Keep testing and fix bugs!
Feedback
Please submit your feedbacks and issues in HERE.
- What do like?
- What don't you like?
- What features would you like to see prioritized on the roadmap?
- Do you have any problem with tool?
- Do you need any exploit to be add?
VBScan Could be improved by adding more module and fixing core to make a better and faster threads, right now VBScan is including more than 70 modules to check bugs, vulnerabilities in perl language. To be more update and check exploits please check the github page.