Golismero Cheat Sheet
Golismero Cheat Sheet
[--volatile-cache] [-a
Cheat
Sheet
concurrent N] [--plugin-timeout N]
#Jason Soto <www.jsitech.com>
[--plugins-folder PATH]
COMMAND [TARGET [TARGET ...]]
#Syntax
#available commands
SCAN:
Perform a vulnerability scan on the given
targets. Optionally import
[--no-color] [--audit-name
NAME] [-db DATABASE] [-nd] [-i FILENAME] [-ni] [-o
FILENAME] [-no] [--full] [--brief]
[--allow-subdomains] [--forbidsubdomains] [--parent] [-np] [-r DEPTH] [--followredirects] [--no-follow-redirects]
RESCAN:
Same as SCAN, but previously run tests are
repeated. If the database is
new, this command is identical to SCAN.
PROFILES:
Show a list of available config profiles. This
command takes no arguments.
COMMAND
action to perform
TARGET
#optional arguments
-h
exit
DUMP:
Dump the database from an earlier scan in SQL
--help
exit
#main options
--config FILE
-no, --no-output
--user-config FILE
--full
UI mode
-v, --verbose
-q, --quiet
--color
--brief
#network options
--allow-subdomains
target scope
output
--no-color
reports
--forbid-subdomains
output
--parent
#audit options
--audit-name NAME
a database
-i FILENAME, --input FILENAME
-ni, --no-input
external tools
follow redirects
--no-follow-redirects
do not follow redirects
--follow-first
maximum number of
concurrent connections per host
disable a plugin
--max-concurrent N
to run concurrently
--plugin-timeout N
execution of a plugin
--plugins-folder PATH
cheacustomize the location
--cookie COOKIE
of the plugins
#Example
#Show Available Plugins
$ ./golismero.py plugins
--user-agent USER_AGENT
set a custom user agent or
'random' value
--cookie-file FILE
#Available Plugins
--persistent-cache
#Import plugins
cache [default]
--volatile-cache
cache
PLUGIN:KEY=VALUE
pass an argument to a
plugin
-e PLUGIN, --enable-plugin PLUGIN
enable a plugin
-d PLUGIN, --disable-plugin PLUGIN
xml_nmap:
xml_openvas:
Import the results of an OpenVAS scan in XML
format.
fingerprint_web:
Fingerprinter of web servers.
xml_sslscan:
Import the results of an SSLScan run in XML
format.
geoip:
Geolocates IP addresses using online services.
This plugin requires a working Internet
connection to run.
#Recon plugins
punkspider:
dns:
DNS resolver plugin.
Without it, GoLismero can't resolve domain
names to IP addresses.
connection to run.
dns_malware:
robots:
spoofed, hijacked.
links.
exploitdb:
shodan:
brute_dns:
Tries to find hidden subdomains by brute force.
connection to run.
brute_url_extensions:
spider:
Web spider plugin.
Without it, GoLismero can't crawl web sites.
spiderfoot:
Integration with SpiderFoot:
http://www.spiderfoot.net/
brute_url_permutations:
Tries to discover hidden files by bruteforcing
the extension:
www.site.com/index.php ->
www.site.com/index.php2
theharvester:
Integration with theHarvester:
https://github.com/MarioVilas/theHarvester/
brute_url_predictables:
Tries to discover hidden files at predictable
locations.
#Scan plugins
brute_directories:
Tries to discover hidden folders by brute
force:
www.site.com/folder/ -> www.site.com/folder2
www.site.com/folder3 ...
brute_url_prefixes:
Tries to discover hidden files by bruteforcing
prefixes:
www.site.com/index.php ->
www.site.com/~index.php
sslscan:
brute_url_suffixes:
Tries to discover hidden files by bruteforcing
suffixes:
www.site.com/index.php ->
www.site.com/index2.php
zone_transfer:
Detects and exploits DNS zone transfer
vulnerabilities.
nikto:
Integration with Nikto:
https://www.cirt.net/nikto2
#Attack plugins
nmap:
heartbleed:
openvas:
Integration with OpenVAS:
http://www.openvas.org/
sqlmap:
SQL Injection plugin, using SQLMap.
Only retrieves the DB banner, does not exploit
any vulnerabilities.
plecost:
WordPress vulnerabilities analyzer, completely
rewritten for GoLismero,
based on the original idea of Plecost
(https://code.google.com/p/plecost/)
xsser:
Integration with XSSer:
http://xsser.sourceforge.net/
msgpack:
MessagePack output for programmatic access.
See: http://msgpack.org/
csv:
Writes reports in Comma Separated Values
format.
odt:
Writes reports in OpenOffice document format
(.odt).
html:
Writes reports as offline web pages.
rst:
Writes reports in reStructured Text format.
json:
JSON output for programmatic access.
text:
Writes plain text reports to a file or on
latex:
screen.
console:
Console user interface. This is the default.
disabled:
Empty user interface. Used by some unit tests.
#Examples
an HTML report:
$./golismero.py scan -i nmap_output.xml -o
report.html
$mkdir ~/.golismero
$nano ~/.golismero/user.conf
[shodan:Configuration]