How to install optiva framework - Get Trick

Hey guys, welcome to my another blog. In this blog we learn how to install Optiva framework in termux or link. If you search how to install optiva framework then this is very useful post for you.



So lets start 

Optiva framework is a web application pen. testing script utilized for data social affair and weaknesses examination. Optiva framework can accumulate open ports data, WHOIS record, invert IP information, HTTP header data, and geo area of the objective web applications. The system can distinguish SQL infusions, cross site prearranging (reflected and JSONP assaults), and Remote Code Execution (RCE) assaults. The device additionally looks for administrator board interfaces through bruteforce assault. Dorking highlight is likewise accessible in the script to look for web applications that are powerless against SQL infusion. Aside from these utilities, Optiva system can likewise make message reviews of wanted content. Optiva framework upholds MD5, SHA256, SHA384, and SHA512 hash capacities. 

Optiva Framework Installation 

To introduce Optiva framework, first clone the system's registry from github archive utilizing the accompanying order. 

git clone https://github.com/joker25000/Optiva-Framework 


Optiva framework cloning 


In the following stage, explore to the Optiva-Framework registry and change authorization rules for the installer.sh record. 

cd Optiva-Framework 

chmod +x installer.sh 

Optiva establishment 

Run the installer.sh record and adhere to the guidelines to finish the establishment interaction. 


How Optiva Framework Works 




Optiva framework can be instated utilizing the accompanying order. 


python optiva.py 

To play out the previously mentioned infiltration testing undertakings, Optiva framework utilizes modules partitioned into three classifications to be specific data social event, scanner, and hash modules. The accompanying order records every one of the modules accessible in Optiva framework. 

show modules 

Every module can be set right into it by composing the order referenced against every module. The accompanying screen capture shows the orders needed to run every module. 

Optiva Framework modules 

For instance, to run the port checking module, we utilize the accompanying order. 

port 

Optiva requests the objective space to filter the open ports and running administrations. Give the objective web application and press the return key to start the port filtering measure. The outcomes are shown in the accompanying arrangement. 

Port outcomes 

A similar methodology can be applied to the remainder of the modules. For example, HTTP header space query module can be introduced utilizing the accompanying header order. 

header 

The module brings the area header data displayed in the accompanying screen capture. 

area header 

The WHOIS query space module assembles data, for example, area enrollment information, recorder data, area creation and expiry date, and nameservers data. 


nitro hacker
whois results 

The IP finder module assembles helpful geo area data about the objective web application including IP address, ISP, district, country, city, map organizes, postal division, and time region data. 

iplocator results 

Other than data gathering modules, we can run the scanner modules to discover the web application weaknesses including SQL, XSS, and RCE bugs. To discover the SQL weaknesses, select the SQL scanner utilizing the accompanying order. 

sql 


The SQL scanner has various payloads to test the web applications security. Optiva runs all the accessible sql payloads to discover the infusion focuses in the objective web application. On the off chance that target web application is defenseless against SQL infusion, Optiva shows every one of the payloads that can be effectively infused in the objective web application. 

sql test 

Optiva framework can identify reflected and JSONP types cross site prearranging weaknesses. To run the cross site prearranging module, run the accompanying order. 

xss 

The accompanying screen capture shows consequences of reflected XSS weakness examination for a test site. 

reflected xss weaknesses result 

Other than data social event and weaknesses appraisal, Optiva framework can play out some other helpful errands, for example, Dorking and hash age. 

Hash module results 

End 

Opitva framework produces definite outcomes utilizing data gathering modules. The scanner modules distinguish weaknesses as well as show the payloads that can abuse the objective web applications effectively.

For video Tutorial



No comments:

Post a Comment