CMS Explorer is designed to reveal the the specific modules, plugins, components and themes that various CMS driven web sites are running.
" I! @; C |: ^& F- l+ a3 Z
3 Z2 v$ N+ P0 P* G* LAdditionally, CMS Explorer can be used to aid in security testing. While it performs no direct security checks, the "explore" option can be used to reveal hidden/library files which are not typically accessed by web clients but are nonetheless accessible. This is done by retrieving the module's current source tree and then requesting those file names from the target system. These requests can be sent through a distinct proxy to help "bootstrap" security testing tools like Burp, Paros, Webinspect, etc.# _; ]7 b: D% e: g3 m
4 E V0 ^" n8 N1 ]' I8 GCMS Explorer can also search OSVDB for vulnerabilities with the installed components.
/ M$ S: z9 P" s; {& o+ X5 k3 u5 f* Z7 f! C$ A. _6 r# h
CMS Explorer currently supports module/theme discovery with the following products:
# V# c$ q" }. S5 e
- c9 d7 \" i% N. ADrupal
1 g; N" E! k' u' K! l" h3 IWordpress
& a+ V+ d; I6 m1 R3 FJoomla!
! Q( b+ N6 `0 h! j% k3 V& w7 }3 CMambo
3 U `- c+ h* d$ Q: w$ N- p. mAnd exploration of the following products:
1 K7 {/ T# k" D6 u- c+ o9 A4 W1 X1 r2 u0 v9 B+ g' M6 g7 M
Drupal
" K8 n( i: m% _# g) H( {Wordpress! C' p. g; [* \$ [( ]
See the wiki for more details and usage information.
8 x* X: E: E( j+ h( ]
8 y2 |5 g1 [! ?* y) T4 ]) N項目地址:http://code.google.com/p/cms-explorer/ |