Darkjumper- Automatic Tool Tutorial

Web application security is a big issue for the administrator of different website and for the hosting provider. How it is a issue for web hosting provider? Well if one the website compromise than there is a chance to compromise all the website that hosted on the same server that has been compromised before.
So, for finding a bug on web application is necessary part of a pen testing. 


p { margin-bottom: 0.08in; }a:link { }

There are several tools available for measuring the security of a website, the tools available for both Windows and Linux based operating system. Here is a comprehensive list of a tool that we have discussed before.

Now the main aim of writing this article is to introduce darkjumper, darkjumper is a tool that written on python and it has an ability to check every website that host at the same server of your target website. It can check the vulnerabilities on every website that host on the same server.
Key Feature
  • Scan for SQL-I, Blind SQL-I, Local file inclusion and remote file inclusion on every website that host on the same server.
  • CGI directory finding
  • Enumeration
  • Auto injection
  • Proxy
  • Port Scanning

p { margin-bottom: 0.08in; }h2 { margin-bottom: 0.08in; }h2.ctl { font-family: “Lohit Hindi”; }a:link { }code.cjk { font-family: “DejaVu Sans”,monospace; }

At the time of writing this Darkjumper V5.7 is available. Click here to download.
DarkJumper Tutorial 
You need python to run darkjumper, first of all the basic thing is the help use help command to learn more about darkjumper.
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }
./darkjumper.py -h
  • The second important command is 
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }
./darkjumper.py -t [target] -m reverseonly

  •   Reverseonly means means the tool only reverse the target IP no checking for bug. Now if you want to check SQL-I bug use this command.
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }
./darkjumper.py -t [target] -m injection

  •   For RFI and LFI use
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }

./darkjumper.py -t [target] -m inclusion

  • For both injection and inclusion use
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }

./darkjumper.py -t [target] -m full



Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...