Skipfish is an active web application security reconnaissance tool. It prepares an interactive sitemap for the targeted site by carrying out a recursive crawl and dictionary-based probes.
The resulting map is then annotated with the output from a number of active (but hopefully non-disruptive) security checks. The final report generated by the tool is meant to serve as a foundation for professional web application security assessments.
Also, learn an Advanced Web Hacking & Penetration Testing Course – Scratch to Advance
Also Read : Commix – Automated All-in-One OS Command Injection and Exploitation Tool
Step1: To get all the parameters of type skipfish -h
root@kali:~# skipfish -hStep 2: To scan the target and write the output in the directory.
root@kali:~# skipfish -d -o 202 http://192.168.169.130/It will go on scanning through every request, external/Internal links, and statistics.
Once the scan is completed it will create a professional web application security assessment.
Output consists of various sections such as document type and Issue type overview.
You need to customize your HTTP requests when scanning big sites.
-H To insert any additional, non-standard headers.
-F To define a custom mapping between a host and an IP.
-d Limits crawl depth to a specified number of subdirectories.
-c Limits the number of children per directory.
-x Limits the total number of descendants per crawl tree branch.
-r Limits the total number of requests to send in a scan.
skip fish also provides the summary overviews of document types and issue types found, and an interactive sitemap, with nodes discovered through brute force, denoted in a distinctive
way.
Need to specify -e to avoid binary responses for reporting.
Belgium’s State Security Service (VSSE) has suffered what is being described as its most severe…
Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved into…
Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable new…
A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched Check…
A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s PingAM…
A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software has…