Sponsored
Bugbounty Tools

Broken Link Checker Tool – Hijacking

Hey Folks, today in this tutorial we are going to talk about a web application penetration testing tool called “broken-link-checker”. The code of this tool is written in Node JS language which comes with the below mentioned features.

Features

  • Support for many HTML elements and attributes; not only and Support for relative URLs with .
  • WHATWG specifications-compliant HTML and URL parsing.
  • Honor robot exclusions (robots.txt, headers and rel), optionally.
  • Detailed information for reporting and maintenance.
  • URL keyword filtering with simple wildcards.
  • Pause/Resume at any time.

Let’s test it 😛 !!

Required Dependencies

So first we have to install “npm” dependency which is usually not pre-installed in any operating system. npm is the package manager for Node. js and the JavaScript coding language.

apt install npm

Good 🙂 !! Now we can easily install and configure any node js project using this utility like below.

npm install broken-link-checker -g

Done 🙂 !! We think users will become experts by installing different tools with us. Well the tool has been installed and you can now operate it by just dropping its name on the terminal.

blc --help

Recursive and Ordered

Basically we just have to name the website we want to hunt down and add filters to get the results in recursively. Sometimes the external links of the website get expired and the owner of the website does not look at them even once and the reason for this carelessness can reward the hackers.

blc https://secnhack.in -ro

Exclude Internal Links

We think that searching internal links is not useful. Suppose even if we get it, we will exclude internal link search process which will reduce the search time and will give us quick and accurate results.

blc https://secnhack.in -i

Finally 🙂 !! We have tested the rest of the features of this tool but they don’t seem useful so we gave up but you can try once yourself.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

4 weeks ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.