Prerequisites
Before starting, ensure you have:- Completed the installation process
- All dependencies installed (Nmap, SQLMap, WPScan, Gobuster)
- A test target system (DVWA recommended for learning)
- Proper authorization to test the target system
Running Your First Audit
Step 1: Launch the Framework
Navigate to the framework directory and run the main script:Root privileges are required for Nmap OS detection and some port scanning features.
Step 2: Select an Attack Mode
The interactive menu presents six attack options:Full Audit (DVWA + WordPress)
Option 1: Complete security assessment against the default target (192.168.56.102)Tools: Nmap + Gobuster + SQLMap + WPScan + Hash Cracker
Auto-Discover Network + Audit
Option 2: Scan a subnet to discover live hosts, then audit each oneDefault network: 192.168.56.0/24
Reconnaissance Only
Option 3: Network scanning and directory enumeration without exploitationTools: Nmap + Gobuster
SQL Injection Only
Option 4: Targeted SQLMap attack against DVWA with hash crackingTools: SQLMap + Hash Cracker
WordPress Brute-Force Only
Option 5: WordPress vulnerability scan and credential brute-forceTools: WPScan with rockyou.txt
Example: Running a Full Audit
Let’s walk through a complete audit against the default DVWA target:1. Select Option 1
2. Audit Phases
The framework executes six phases automatically:Phase 1: Reconnaissance (Nmap)
Phase 1: Reconnaissance (Nmap)
Phase 2: Directory Enumeration (Gobuster)
Phase 2: Directory Enumeration (Gobuster)
Phase 3: SQL Injection (SQLMap)
Phase 3: SQL Injection (SQLMap)
Phase 4: WordPress Testing (WPScan)
Phase 4: WordPress Testing (WPScan)
Phase 5: Hash Cracking
Phase 5: Hash Cracking
Phase 6: Risk Analysis
Phase 6: Risk Analysis
3. Credentials Summary
After all phases complete, the framework displays extracted credentials:4. PDF Report Generation
5. Audit Complete
Understanding the Output
Output Directory Structure
All results are saved to theoutputs/ directory:
Risk Levels
The framework calculates risk based on:| Risk Level | Score Range | Indicators |
|---|---|---|
| 🟢 LOW | 0-9 | Few open ports, no critical vulns |
| 🟡 MEDIUM | 10-29 | Some dangerous ports, minor vulns |
| 🟠 HIGH | 30-59 | Multiple dangerous ports, HTTP exposed |
| 🔴 CRITICAL | 60+ | Critical vulns, SQL injection, weak credentials |
Common Configuration
Changing the Default Target
Editconfig.py to set your default target:
config.py
DVWA Credentials
If your DVWA uses different credentials:config.py
Troubleshooting
Target not responding
Target not responding
Issue: No services detected or connection timeoutSolutions:
- Verify target IP is correct and reachable:
ping 192.168.56.102 - Check firewall rules on target system
- Ensure target is powered on (for VMs)
- Verify network configuration matches your environment
SQLMap: No injection found
SQLMap: No injection found
Issue: SQLMap doesn’t detect vulnerabilityPossible reasons:
- DVWA security level is too high (should be “low”)
- Cookie authentication failed - check DVWA_DEFAULT_USER/PASS
- Target URL is incorrect - verify /dvwa/vulnerabilities/sqli/ exists
- WAF or IPS is blocking SQLMap signatures
WPScan: WordPress not found
WPScan: WordPress not found
Issue: WPScan can’t locate WordPress installationSolutions:
- Verify WordPress is installed at /wordpress/ or /wp-login.php
- Update
WORDPRESS_PATHSin config.py if using custom path - Check that port 80/443 is open and responding
- Ensure WordPress is fully configured (not showing setup page)
Permission denied errors
Permission denied errors
Issue: Tools fail with permission errorsSolution: Run with sudo for Nmap OS detection and low-port scanning:
Next Steps
Core Concepts
Understand the framework architecture and workflow
Attack Modules
Learn about individual attack modules in detail
Configuration
Customize settings for your environment
PDF Reports
Understand the generated security reports