Sponsored
Information Gathering

Osmedeusr : Automated Offensive Security Framework

Hey Folks, in this tutorial we are going to talk about an open source information gathering tool called โ€œOsmedeusrโ€œ. Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.

Letโ€™s take a look ๐Ÿ™‚ !!

Installation

We have to download this tool from github by using the git command and then go to the directory of this tool. After completing all the steps we will execute the bash command to setup this tool completely.

git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus/
bash install.sh

Done ๐Ÿ™‚ !! The tool has been setup successfully and now we can boot this tool using the following command.

python3 osmedeus.py

Usage Guide

You can see all the features available in this tool by executing the above command.

Create User

This provides us GUI interface to control and manage the output of the scanning, so we need to create a user for login to the web application.

python3 server/manage.py createsuperuser

Basic Scan

This is a basic scan but it will dump almost everything at the same time. Just add your taregt details and execute the command.

python3 osmedeus.py -t http://vulnweb.com

After executing the command it will give us the location where the web application is actually hosted and running locally. Just open the given location by the tool.

Good ๐Ÿ™‚ !! The GUI interface looks great and now we need to enter the created credentials.

Summary

After successful login we get the following option inside the web application. In the summary section we get the list of subdomains.

Logs Summary

On the other hand you can see all past and present ongoing scanning as well as their path where they are being saved.

Report Summary

Through the following section we can directly see all the saved results of the specific host or the target.

Hmmm ๐Ÿ™‚ !! As we told you that you can see the saved output by clicking the โ€œBash Outputโ€ button on the terminal.

Also, if you donโ€™t like the GUI interface, you can also see the result on the command line terminal.

We cannot cover all the facilities at the same time, so thus you can use every single feature of the tool yourself.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Gau (GetAllUrls) – Find Known and Hidden URL

The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…

3 months ago

Jsluicepp – Burp Extension for JS Secrets – BugBountyTip

Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…

8 months ago

Bypassing Firewalls (WAF) with XSS Payloads

Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…

8 months ago

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 year ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

2 years ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

3 years ago
Sponsored

This website uses cookies.