Commit 0bd0c26a authored by imax's avatar imax

Updated Readme.

parent 8d4aa8e5
......@@ -12,79 +12,50 @@ I am dead serious.
* * *
I'm trying twitter right now to announce cool SVN updates.
Feel free to follow: [http://twitter.com/fimap](http://twitter.com/fimap)
If you don't like twitter like me then keep watching the Quick News below :)
Find fimap on twitter: [http://twitter.com/fimap](http://twitter.com/fimap)
## Quick News for SVN and upcoming versions
* fimap has moved! The official fimap site is now available at https://tha-imax.de/git/root/fimap
* Thank you to https://github.com/Oweoqi for doing the hard work and converting the project from googlecode to github!
## What works currently?
## fimap Features
* Check a Single URL, List of URLs, or Google results fully automaticly.
* Can identify and exploit file inclusion bugs.
* Relative\Absolute Path Handling.
* Tries automaticly to eleminate suffixes with Nullbyte and other methods like Dot-Truncation.
* Remotefile Injection.
* Logfile Injection.
* Relative\Absolute Path Handling.
* Tries automaticly to eleminate suffixes with Nullbyte and other methods like Dot-Truncation.
* Remotefile Injection.
* Logfile Injection.
* Test and exploit multiple bugs:
* include()
* include_once()
* require()
* require_once()
* include()
* include_once()
* require()
* require_once()
* You always define absolute pathnames in the configs. No monkey like redundant pathes like:
* ../etc/passwd
* ../../etc/passwd
* ../../../etc/passwd
* ../etc/passwd
* ../../etc/passwd
* ../../../etc/passwd
* Has a Blind Mode (--enable-blind) for cases when the server has disabled error messages.
* Has an interactive exploit mode which...
* ...can spawn a shell on vulnerable systems.
* ...can spawn a reverse shell on vulnerable systems.
* ...can do everything you have added in your_payload-dict_ inside the_config.py_
* Add your own payloads and pathes to the config.py file.
* ...can spawn a shell on vulnerable systems.
* ...can spawn a reverse shell on vulnerable systems.
* ...can do anything you can imagine through it's plugin interface.
* Add your own payloads and pathes to the xml files or go ahead and write a new plugin.
* Has a Harvest mode which can collect URLs from a given domain for later pentesting.
* Works also on windows.
* Can handle directories in RFI mode like:
* <tt><? include ($_GET["inc"] . "/content/index.html"); ?></tt>
* <tt><? include ($_GET["inc"] . "_lang/index.html"); ?></tt>
* where Null-Byte is not possible.
* <tt><? include ($_GET["inc"] . "/content/index.html"); ?></tt>
* <tt><? include ($_GET["inc"] . "_lang/index.html"); ?></tt>
* where Null-Byte and the '?' trick is not possible.
* Can use proxys.
* Scans and exploits GET, POST and Cookies.
* Has a very small footprint. (No senseless bruteforcing of pathes - unless you need it.)
* Can attack also windows servers!
* Has a tiny plugin interface for writing exploitmode plugins
* Non Interactive Exploiting
## What doesn't work yet?
* Other languages than PHP (even if engine is ready for others as well.)
## Is there a How To?
......@@ -113,15 +84,3 @@ If you don't like twitter like me then keep watching the Quick News below :)
* The [Python](http://python.org) Project
* The [Eclipse](http://eclipse.org) Project
* The [Netbeans](http://netbeans.org) Project
* * *
## Tools and Sites I really like
* [http://aluigi.org](http://aluigi.org) Luigi Auriemma
* [http://debian.org](http://debian.org) Debian
* [http://sikuli.org](http://sikuli.org) Sikuli
* [http://eu.battle.net/sc2/en](http://eu.battle.net/sc2/en) Starcraft 2 - I really like Starcraft :)
* [http://sqlmap.sourceforge.net](http://sqlmap.sourceforge.net) sqlmap
* [http://yakuake.kde.org](http://yakuake.kde.org) Yakuake
* [http://virtualbox.org](http://virtualbox.org) Virtual Box
\ No newline at end of file
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment