fbpx

Darkjumper- Automatic Tool Tutorial

Web application security is a big issue for the administrator of different website and for the hosting provider. How it is a issue for web hosting provider? Well if one the website compromise than there is a chance to compromise all the website that hosted on the same server that has been compromised before.
So, for finding a bug on web application is necessary part of a pen testing. 


p { margin-bottom: 0.08in; }a:link { }

There are several tools available for measuring the security of a website, the tools available for both Windows and Linux based operating system. Here is a comprehensive list of a tool that we have discussed before.

Now the main aim of writing this article is to introduce darkjumper, darkjumper is a tool that written on python and it has an ability to check every website that host at the same server of your target website. It can check the vulnerabilities on every website that host on the same server.
Key Feature
  • Scan for SQL-I, Blind SQL-I, Local file inclusion and remote file inclusion on every website that host on the same server.
  • CGI directory finding
  • Enumeration
  • Auto injection
  • Proxy
  • Port Scanning

p { margin-bottom: 0.08in; }h2 { margin-bottom: 0.08in; }h2.ctl { font-family: “Lohit Hindi”; }a:link { }code.cjk { font-family: “DejaVu Sans”,monospace; }

At the time of writing this Darkjumper V5.7 is available. Click here to download.
DarkJumper Tutorial 
You need python to run darkjumper, first of all the basic thing is the help use help command to learn more about darkjumper.
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }
./darkjumper.py -h
  • The second important command is 
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }
./darkjumper.py -t [target] -m reverseonly

  •   Reverseonly means means the tool only reverse the target IP no checking for bug. Now if you want to check SQL-I bug use this command.
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }
./darkjumper.py -t [target] -m injection

  •   For RFI and LFI use
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }

./darkjumper.py -t [target] -m inclusion

  • For both injection and inclusion use
p { margin-bottom: 0.08in; }code.cjk { font-family: “DejaVu Sans”,monospace; }

./darkjumper.py -t [target] -m full



Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...