From 62d77ece0169859c86c37792a5cf5ade70c9bec4 Mon Sep 17 00:00:00 2001 From: Swissky Date: Tue, 12 Sep 2017 12:04:03 +0200 Subject: [PATCH] README : Image update --- .gitignore | 1 + README.md | 12 ++++++++---- Screens/Notification.png | Bin 0 -> 34473 bytes 3 files changed, 9 insertions(+), 4 deletions(-) create mode 100644 Screens/Notification.png diff --git a/.gitignore b/.gitignore index 347fc0d..d295e08 100644 --- a/.gitignore +++ b/.gitignore @@ -1,2 +1,3 @@ *.pyc Server/__pycache__/* +TODO.md diff --git a/README.md b/README.md index fc2ac51..f206277 100755 --- a/README.md +++ b/README.md @@ -2,6 +2,8 @@ Another web vulnerabilities scanner, this extension works on Chrome and Opera. The extension is working on the background and will notify you if it finds any vulnerability. +![Image of a noticiation](https://github.com/swisskyrepo/DamnWebScanner/blob/master/Screens/Notification.png?raw=true) + Currently it scans for: - SQL Injection - Cross Site Scripting @@ -18,9 +20,9 @@ All the features are: - Export vulnerabilities into a CSV file - Launch scan when a form is submitted or a page is opened via the URL bar -**Warnings :** Do not use this extension for illegal purpose, the main goal of it is to simplify the life of bug hunters. It's a **BETA version**, many improvements will come don't worry +**Warning :** Do not use this extension for illegal purpose, the main goal of it is to simplify the life of bug hunters. It's a **BETA version**, many improvements will come don't worry -**Warnings 2:** XSS Scanner seems to be broken due to an update in the Ghost lib. I'm working on a fix. +**Warning 2:** XSS Scanner seems to be broken due to an update in the Ghost lib. I'm working on a fix. ## Install You need to install and configure the server, it uses ghost and flask. @@ -40,8 +42,10 @@ var config_server = "http://127.0.0.1:8000"; 4. Browse the internet ! (Don't forget to start the extension by clicking the 'START' button) + You can try the Error SQL, Blind SQL, LFI with Damn Vulnerable Web App. -The SQL Injection scanner was also tested on https://pentesterlab.com/badges/essential. +The SQL Injection scanner was also tested on https://pentesterlab.com/badges/essential. +![Image of DVWA Result](https://github.com/swisskyrepo/DamnWebScanner/blob/master/Screens/Results%20DVWA.png?raw=true) ## Debugging @@ -56,7 +60,7 @@ STDOUT ---[ POST - New parameter rememberme for url: http://[REDACTED]/login.php ]--- XSS Failed  for rememberme with the payload : jaVasCript:alert(1)//" name=alert(1) ]'">