Open In App

Altair – Open Source Modular Web Vulnerability Scanner

Last Updated : 27 Jan, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

Vulnerability Scanning is the methodology to detect the security flaws in the target domain. We can detect these flaws by the manual method in which we can test the HTML elements like buttons, input boxes, and many more. But this approach is a bit lengthy approach, so we can use automated tools. Altair tool is an automated cyber security tool that has the potential to detect various types of security flaws like XSS, LFI, SQLi, and many more. This tool is automated in the Python Language and freely available on the GitHub platform.

Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux

Installation of Altair Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone https://github.com/evilsocket/altair.git

Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd altair

Step 3: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.

python3 altair.py  --help

Working with Altair Tool on Kali Linux OS

Example 1: Basic Vulnerability Scan 

python3 altair.py -u http://testphp.vulnweb.com

In this example, we have given the target domain URL.

Altair tool is crawling the links or files from the target domain.

The tool has identified some of the vulnerabilities in the target domain

Example 2: Scanning only SQL Injection 

python3 altair.py –filter=sqli –load-modules=sqlmap –url=http://testphp.vulnweb.com

In this example, we will be loading only sqlmap module to check SQLi vulnerability on the target domain.

The tool has loaded the sqlmap module and started the crawling process.

The tool has detected the SQLi Vulnerability in the target domain

In the below screenshot, we have detected information about the vulnerability identified.


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads