Vega includes an automated scanner for quick tests and an intercepting proxy for tactical inspection. Vega can be extended using a powerful API in the language of the web: Javascript.
Modules used in Vega:
* Cross Site Scripting (XSS)
* SQL Injection
* Directory Traversal
* URL Injection
* Error Detection
* File Uploads
* Sensitive Data Discover
Core functions of Vega:
* Automated Crawler and Vulnerability Scanner
* Consistent UI
* Website Crawler
* Intercepting Proxy
* SSL MITM
* Content Analysis
* Extensibility through a Powerful Javascript Module API
* Customizable alerts
* Database and Shared Data Model
Vega Installation
Download the archive corresponding to your architecture Linux GTK 32-bit Intel | Linux GTK 64-bit Intel
Unzip it in your home directory, or wherever appropriate.
Change into your home directory and run ./Vega.
Using Vega:
When you start Vega for the first time, you will be in the scanner perspective. Vega has two perspectives: The scanner, and the proxy. The Vega scanner is an automated security testing tool that crawls a website, analyzing page content to find links and form parameters. Vega finds injection points, referred to as path state nodes, and runs modules written in Javascript to analyze them. Vega also runs Javascript modules on all responses sent back from the server during the scan.
Open up the Vega UI and type the site address on which you need to perform the security scanning.
Latest release:
1.0 Beta
Released on
June 29, 2011
DOWNLOAD VEGA
Links for binary packages built for various platforms are listed below (Java 6 required):
VEGA REQUIREMENTS- Java 6 (Oracle or OpenJDK)
- On Ubuntu/Fedora/Other: libwebkitgtk-1.0
- 1GB RAM
- Linux, OS X, Windows: Intel 32/64-bit
New users can get familiar with the core features of Vega by reading the following two guides:
Getting Started with the Scanner
Using the Vega Proxy
Source-
http://subgraph.com/products.html
More info -
http://www.toolswatch.org/2012/08/blackhat-arsenal-2012-releases-vega-open-source-web-application-scanner-1-0-beta/
0 comments:
Post a Comment