Web app pentest with Vega
Vega is an open source web app pentesting tool built in to Java. It has a JavaScript-based API, which makes it even more powerful and flexible. Vega is pretty easy to use in the following recipe, and you will learn how to perform a scan with it.
Getting ready
Some Kali versions do not come with Vega installed, but it can be installed using the command:
apt-get install vega
How to do it...
- Vega is inbuilt in Kali and can be started using this command:
vega
The preceding command opens up the Vega tool:
![](https://static.packt-cdn.com/products/9781787121829/graphics/cce881c1-6f77-427b-94e6-d8639aa333fd.png)
- There are two ways to start a scan in Vega—by choosing either the scanner mode or the proxy mode. We look at the scanner mode here.
- We choose the
Start New Scan
options from theScan
menu:
![](https://static.packt-cdn.com/products/9781787121829/graphics/9034997e-6022-483e-95eb-2793b0c259b7.png)
- In the window, we enter the website URL and click on
Next
:
![](https://static.packt-cdn.com/products/9781787121829/graphics/83da8f26-a7b5-48c2-bc2e-2bc7693cce8f.png)
- Then, we can choose the modules we want to run:
![](https://static.packt-cdn.com/products/9781787121829/graphics/6995428c-b763-4dfa-a962-3a00147b37c5.png)
- In this step, we can enter the cookies:
![](https://static.packt-cdn.com/products/9781787121829/graphics/c42ac7eb-0755-4701-a640-c35f50b44054.png)
- Next, we specify whether we want to exclude any parameters and then we click on
Finish
:
![](https://static.packt-cdn.com/products/9781787121829/graphics/2bf7baf2-f1e2-4724-80dd-1ebe903b774b.png)
- We can see the results and vulnerabilities in the left...