Vega is an open source platform for testing the security of web
applications. Vega can help you find and validate SQL injections ,
cross-site scripting (XSS) , inadvertently disclosed sensitive
information, and other vulnerabilities. It is written in Java , GUI
-based , and runs on Linux, OS X and Windows.
Vega includes an automated scanner for rapid testing and filtering proxies for tactical inspection. Vega can be expanded using a powerful API in the language of the web: Javascript.
Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you
== using vega ==
It’s simple go to ” Applications – > Kali Linux -> Web Applications -> Web Application Proxies -> vega

And this is how it look like .

Click on “scan” and type a website url :

Add cookies if you want or regex exclusion .

The right side will show the vulnerability after the scan is completed .

The scanner is not very powerful but it’ quick to audit , 5 minutes is enough , but for a thorough audit it is better to use more powerful tools.
Vega includes an automated scanner for rapid testing and filtering proxies for tactical inspection. Vega can be expanded using a powerful API in the language of the web: Javascript.
Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that do not belong to you
== using vega ==
It’s simple go to ” Applications – > Kali Linux -> Web Applications -> Web Application Proxies -> vega

And this is how it look like .

Click on “scan” and type a website url :

Add cookies if you want or regex exclusion .

The right side will show the vulnerability after the scan is completed .

The scanner is not very powerful but it’ quick to audit , 5 minutes is enough , but for a thorough audit it is better to use more powerful tools.
Canon provides customer support for everyone who is in a dire need for a printer fix.Follow the links to know more:
ReplyDeleteBrother printer support | Canon Printer Support | Epson printer support | Canon Printer Support | Hp printer support
A printer is a human-made device; it will meet some glitches in future, just dial the toll-free number of HP printer support for customers 24/7.
ReplyDeleteHP Printer support | Epson Printer Support