ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!

Jump to content



Photo

(QUESTION)XAttacker / JEx BOT - Are they still effective and working?


  • Please log in to reply
(QUESTION)XAttacker / JEx BOT - Are they still effective and working?

#1

neMMezis
neMMezis
    Offline
    21
    Rep
    385
    Likes

    www.spamcartel.pw

  • PipPipPipPipPipPipPip
Posts: 1875
Threads: 89
Joined: Mar 16, 2015
Credits: 0

Deal with caution
User has an open scam report.
Eight years registered
#1

What's your opinion on the auto-exploit bots like XAttacker, jex and xvuln?
Im experiencing difficulty's with all of them, false positive's and no shell uploads/hits on any vulnearability.
I think it might be because of my dorks or because most o the xploits being used are already patched.

 

What are your experiences guys?


  • 1

#2

AssLord
AssLord
    Offline
    21
    Rep
    38
    Likes

    Member

Posts: 48
Threads: 8
Joined: Jan 10, 2016
Credits: 0

Eight years registered
#2

Okay, I don't have much experience with these auto-exploiters and have really only been vaguely familiar with them up until recently and I'm now starting to look into them a bit more.

So take what I say with a grain of salt:

My take on them is that they do work, but It depends on the quality of the URL lists you feed it.

And the quality of the URL list is dependent upon how precise your dorks are.

Your dorks have to be able to reasonably find outdated websites from a variety of CMSs. This means that the dorks used for SQLi dumper may be entirely different than the ones used for Auto-exploiters.

The keywords you'd be looking for MAY be different and they may contain different parameters.

In manual shelling, you're often looking for very low hanging fruits such as a simple UNION based SQLI or even a login bypass, but these are very old vulnerabilities that are typically only still found on shitty offshore websites

that all get written by the same eastern Asian web-dev firms that still don't know to sanitize user input.

With an auto exploiter, you're more looking for slightly out of date Joomla sites or WordPress as that's what the majority of sites are running nowadays and that's what these auto-exploiters scan for: vulnerabilities in old CMS plugins and misconfigurations that come along with the default install procedures.


  • 1

#3

CryptoRanger
CryptoRanger
    Offline
    2
    Rep
    9
    Likes

    Member

  • PipPipPip
Posts: 25
Threads: 8
Joined: Feb 08, 2020
Credits: 0
Four years registered
#3

I think they are very useful as you can easily attack many websites But they are more likely to target older, outdated sites. But as they continue to publish new vulnerabilities, it is easy to expand these bots.


  • 1

#4

neMMezis
neMMezis
    Offline
    21
    Rep
    385
    Likes

    www.spamcartel.pw

  • PipPipPipPipPipPipPip
Posts: 1875
Threads: 89
Joined: Mar 16, 2015
Credits: 0

Deal with caution
User has an open scam report.
Eight years registered
#4

Okay, I don't have much experience with these auto-exploiters and have really only been vaguely familiar with them up until recently and I'm now starting to look into them a bit more.

So take what I say with a grain of salt:

My take on them is that they do work, but It depends on the quality of the URL lists you feed it.

And the quality of the URL list is dependent upon how precise your dorks are.

Your dorks have to be able to reasonably find outdated websites from a variety of CMSs. This means that the dorks used for SQLi dumper may be entirely different than the ones used for Auto-exploiters.

The keywords you'd be looking for MAY be different and they may contain different parameters.

In manual shelling, you're often looking for very low hanging fruits such as a simple UNION based SQLI or even a login bypass, but these are very old vulnerabilities that are typically only still found on shitty offshore websites

that all get written by the same eastern Asian web-dev firms that still don't know to sanitize user input.

With an auto exploiter, you're more looking for slightly out of date Joomla sites or WordPress as that's what the majority of sites are running nowadays and that's what these auto-exploiters scan for: vulnerabilities in old CMS plugins and misconfigurations that come along with the default install procedures.

Looked like a week into it, dedicated a RDP to a few of them and i can relate to everything you describe.

You raelly have to have good CMS targeted dorks.


  • 1


 Users browsing this thread: