SlideShare a Scribd company logo
1 of 20
Download to read offline
NOEL MOSES MWADENDE
PAROS VULNERABILITY
SCANNER
HOW TO USE PAROS
PAGE 1
ABOUT THE AUTHOR
Noel Moses Mwadende is the passionate book and article
writer based of different books and articles concern
computer science in general, especially in cybersecurity and
machine learning, currently Noel is employed as youtuber
and book author at MoTech which is mini firm dealing with
provision of information technology services.
PAGE 2
INTRODUCTION.
It happen I had my vulnerability scanner reporting that
there was SQL injection in a website, I dived in exploiting it
but it was unable to be exploited then I thought it would be
false positive result from my scanner, then after I thought
how can I know if it is false positive or it was end of my ability
in exploiting SQL injection, then it thought it is better to scan
vulnerability by using more than one tool, then after I tried to
learn how can I use another vulnerability scanner which is
called paros, after knowing how to use it today am ready to
share my experience to you.
PAGE 3
TABLE OF CONTENTS
CHAPTER ONE
CONFIGURING PROXY ON BROWSER ...................................... 4 - 6
CHAPTER TWO
START PAROS ........................................................................................7
CHAPTER THREE
BROWSING TARGET WEB PAGES ........................................... 8 - 10
CHAPTER FOUR
SCANNING VULNERABILITY..................................................11 - 13
CHAPTER FIVE
ANALYSIS OF SCAN RESULTS ................................................14 - 15
PAGE 4
CHAPTER ONE.
CONFIGURING PROXY ON BROWSER.
On the top right side of your browser, am using Mozilla
Firefox, there is bar as shown in the figure 1, if you place
cursor on it, it is highlighted as Open menu, click it and
find preferences.
Fig. 1.
Fig. 2.
After clicking on the preferences, your browser will look as
it is shown in the figure 2, on above search field type
PAGE 5
network, network proxy will come up as shown in the figure
3 then click on settings.
Fig. 3.
Fig. 4.
Proxy uses 127.0.0.1:8080, that is IP address of the localhost
and port it uses that is 8080, make sure everything is
configured the same as shown in the figured 4.
PAGE 6
Fig. 5.
If you get any trouble try this, go on the top view of paros
find tab called tools ➔ options, and check if above fields
are filled as shown in the figure 5, just focus on the second
option which is named local proxy.
PAGE 7
CHAPTER TWO.
START PAROS.
There are two options to start paros, you can start paros
from terminal or search it from menu, but you should make
sure that proxy is well configured on your browser.
Option to get and start paros
➔ Terminal.
➔ Search menu.
Start paros on terminal. as shown on figure 6 or you can go
to menu, search it and double click it to start paros.
Fig. 6.
PAGE 8
CHAPTER THREE.
BROWSING TARGET WEB PAGES.
Browse different pages of target so that all request can be
intercepted by proxy and being sent to the proxy, make
sure you browse a lot of pages so that many requests can
be sent to paros.
Important pages to browse.
 Login forms.
 Register forms.
 Any other forms in the target site.
 All application.
 Subdomain, if any.
 Uploading options.
Those are the most sensitive pages to browse, and this is
because they sent request direct to the server, they sent
queries to the server, as proxy is available, those intercepted
request may easily checked and analyzed. For my case, my
target is localhost/DVWA/ so I will do the following.
➔ Browse in different pages.
PAGE 9
Fig. 7.
In the figure 7, I was trying to browse in different pages.
➔ Input data in input fields.
Fig. 8.
If target Web page have any input forms as shown in the
figure 8, input any data then submit.
➔ Upload image.
PAGE 10
Fig. 9.
If web page got option to upload anything, just upload as
shown in the figure 9, testing site had option which allow
a client to upload images to the server.
➔ Checking all forms.
Fig. 10.
If there is any form which looks similar with the form
shown in the figure 10, fill it and submit the input data.
PAGE 11
CHAPTER FOUR.
SCANNING VULNERABILITY.
Fig. 11.
Target directory structure has been spidered and is
displayed under sites button and shown in the figure 11,
from 3 to 10, those are requests browsed on the browser.
On the top of figure 11 there is option named Analyse,
click on it then the following options will appear
➔ Spider.
➔ Scan All.
➔ Scan.
➔ Scan Policy.
PAGE 12
According to options above you can choose to scan all or
scan, after clicking on one of those two options new
window come up on paros screen as shown in the figure.
Fig. 12.
scanning is finished. Figure 12 shows scanning is in
progress.
Fig. 13.
Figure 12 shows the scanning is completed and
results for scanning are found from Report>Last Scan
PAGE 13
Result. If you go back in the figure 11 you will see option
Report, click on that then you will see Last Scan Report,
that is where your scan is saved.
Fig. 14.
For more analysis of scan results change directory to
/root/paros/session/LatestScannedReport.htm as shown in
the figure 14, that is the directory where all scanned results
by paros are stored.
After scanning is completed you should be able to see scan
result summary as shown in the figure.
Fig. 15.
PAGE 14
CHAPTER FIVE.
ANALYSIS OF SCAN RESULTS.
Fig. 16.
Fig. 17.
Site have directory browsing enabled as shown in the scan result in
the figure 16 and how it looks like when pasted on the browser,
PAGE 15
this means black hacker can browse different folders and files in
the server, and this can lead to leakage of sensitive information
which is undesirable in security point of view. System
administrators should be carefully in their configuration which
should not allow black hackers to view these files.
PAGE 16
CONCLUSION.
That is the end of this article about how to use paros
scanner, thank you all for following this session untill the
end, if you get any trouble contact us, but also if you have
any issue let us know it, MoTech says you’re warm
welcome for our services.
PAGE 17
WAYS TO GET IN TOUCH WITH MoTech.
Linkedin.com
https://www.linkedin.com/in/motech-inc-720261191/
YouTube.com
https://www.youtube.com/channel/UCtuaigKZF3okQnKON5RM1qQ
Amazon.com
https://www.amazon.com/s?k=noel+moses+mwadende&ref=nb_sb_n oss
Github.com
https://github.com/MoTechStore/
Scribd.com
https://www.scribd.com/user/470459684/MoTech
SlideShare.com
https://www.slideshare.net/MoTechInc?utm_campaign=profiletracking&utm_
medium=sssite&utm_source=ssslideview
PAGE 18
REFERENCES.
1. https://tools.kali.org/web-applications/paros
2. https://null-byte.wonderhowto.com/forum/hiob-using-paros-for-
web-application-auditing-and-debugging-0158950/
3. http://beginnerhack.blogspot.com/2013/08/paros-in-kali-linux.html
4. https://www.ehacking.net/2011/05/paros-proxy-web-application-
security.html
5. https://sectools.org/tool/paros/
PAGE 19

More Related Content

Similar to How to Use Paros Vulnerability Scanner

7- How to Configure Disk Quota
7- How to Configure Disk Quota7- How to Configure Disk Quota
7- How to Configure Disk QuotaFahad Al-Balushi
 
sts-scanner_tutorial
sts-scanner_tutorialsts-scanner_tutorial
sts-scanner_tutorialtutorialsruby
 
sts-scanner_tutorial
sts-scanner_tutorialsts-scanner_tutorial
sts-scanner_tutorialtutorialsruby
 
Call your key to phone all
Call your key to phone allCall your key to phone all
Call your key to phone allGerard Fuguet
 
Getting started-with-oracle-so a-viii
Getting started-with-oracle-so a-viiiGetting started-with-oracle-so a-viii
Getting started-with-oracle-so a-viiiAmit Sharma
 
Share point 2010 enterprise single server farm installation
Share point 2010 enterprise single server farm installationShare point 2010 enterprise single server farm installation
Share point 2010 enterprise single server farm installationparallelminder
 
Share point 2010 enterprise single server farm installation
Share point 2010 enterprise single server farm installationShare point 2010 enterprise single server farm installation
Share point 2010 enterprise single server farm installationparallelminder
 
Project Report on Cloud Storage
Project Report on Cloud StorageProject Report on Cloud Storage
Project Report on Cloud StorageRachitSinghal17
 
Intro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twist
Intro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twistIntro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twist
Intro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twistLauren Hayward Schaefer
 
SharePoint2010 single server farm installation
SharePoint2010 single server farm installationSharePoint2010 single server farm installation
SharePoint2010 single server farm installationparallelminder
 
Intro to IBM Bluemix DevOps Services, an open lab for IBM InterConnect
Intro to IBM Bluemix DevOps Services, an open lab for IBM InterConnectIntro to IBM Bluemix DevOps Services, an open lab for IBM InterConnect
Intro to IBM Bluemix DevOps Services, an open lab for IBM InterConnectLauren Hayward Schaefer
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guidejameszzzzz
 

Similar to How to Use Paros Vulnerability Scanner (20)

7- How to Configure Disk Quota
7- How to Configure Disk Quota7- How to Configure Disk Quota
7- How to Configure Disk Quota
 
sts-scanner_tutorial
sts-scanner_tutorialsts-scanner_tutorial
sts-scanner_tutorial
 
sts-scanner_tutorial
sts-scanner_tutorialsts-scanner_tutorial
sts-scanner_tutorial
 
Soa8
Soa8Soa8
Soa8
 
Call your key to phone all
Call your key to phone allCall your key to phone all
Call your key to phone all
 
Getting started-with-oracle-so a-viii
Getting started-with-oracle-so a-viiiGetting started-with-oracle-so a-viii
Getting started-with-oracle-so a-viii
 
Share point 2010 enterprise single server farm installation
Share point 2010 enterprise single server farm installationShare point 2010 enterprise single server farm installation
Share point 2010 enterprise single server farm installation
 
Share point 2010 enterprise single server farm installation
Share point 2010 enterprise single server farm installationShare point 2010 enterprise single server farm installation
Share point 2010 enterprise single server farm installation
 
Project Report on Cloud Storage
Project Report on Cloud StorageProject Report on Cloud Storage
Project Report on Cloud Storage
 
First lesson
First lessonFirst lesson
First lesson
 
Using wikto
Using wiktoUsing wikto
Using wikto
 
Intro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twist
Intro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twistIntro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twist
Intro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twist
 
SharePoint2010 single server farm installation
SharePoint2010 single server farm installationSharePoint2010 single server farm installation
SharePoint2010 single server farm installation
 
Oracle ADF 11g Tutorial
Oracle ADF 11g TutorialOracle ADF 11g Tutorial
Oracle ADF 11g Tutorial
 
Accessblockedsites
AccessblockedsitesAccessblockedsites
Accessblockedsites
 
Intro to IBM Bluemix DevOps Services, an open lab for IBM InterConnect
Intro to IBM Bluemix DevOps Services, an open lab for IBM InterConnectIntro to IBM Bluemix DevOps Services, an open lab for IBM InterConnect
Intro to IBM Bluemix DevOps Services, an open lab for IBM InterConnect
 
Client Server Live Hosting Documentation
Client Server Live Hosting Documentation Client Server Live Hosting Documentation
Client Server Live Hosting Documentation
 
Search
SearchSearch
Search
 
Girl Gets Ring
Girl Gets RingGirl Gets Ring
Girl Gets Ring
 
Troubleshooting guide
Troubleshooting guideTroubleshooting guide
Troubleshooting guide
 

More from MoTechInc

Make device image in forensic
Make device image in forensicMake device image in forensic
Make device image in forensicMoTechInc
 
Simplified c++ 40 programs
Simplified c++ 40 programsSimplified c++ 40 programs
Simplified c++ 40 programsMoTechInc
 
Pandas tool for data scientist
Pandas tool for data scientist Pandas tool for data scientist
Pandas tool for data scientist MoTechInc
 
Introduction to machine learning
Introduction to machine learningIntroduction to machine learning
Introduction to machine learningMoTechInc
 
Zip password cracker
Zip password crackerZip password cracker
Zip password crackerMoTechInc
 
Nltk installation guide
Nltk installation guideNltk installation guide
Nltk installation guideMoTechInc
 
Information gathering
Information gatheringInformation gathering
Information gatheringMoTechInc
 

More from MoTechInc (7)

Make device image in forensic
Make device image in forensicMake device image in forensic
Make device image in forensic
 
Simplified c++ 40 programs
Simplified c++ 40 programsSimplified c++ 40 programs
Simplified c++ 40 programs
 
Pandas tool for data scientist
Pandas tool for data scientist Pandas tool for data scientist
Pandas tool for data scientist
 
Introduction to machine learning
Introduction to machine learningIntroduction to machine learning
Introduction to machine learning
 
Zip password cracker
Zip password crackerZip password cracker
Zip password cracker
 
Nltk installation guide
Nltk installation guideNltk installation guide
Nltk installation guide
 
Information gathering
Information gatheringInformation gathering
Information gathering
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

How to Use Paros Vulnerability Scanner

  • 1. NOEL MOSES MWADENDE PAROS VULNERABILITY SCANNER HOW TO USE PAROS
  • 2. PAGE 1 ABOUT THE AUTHOR Noel Moses Mwadende is the passionate book and article writer based of different books and articles concern computer science in general, especially in cybersecurity and machine learning, currently Noel is employed as youtuber and book author at MoTech which is mini firm dealing with provision of information technology services.
  • 3. PAGE 2 INTRODUCTION. It happen I had my vulnerability scanner reporting that there was SQL injection in a website, I dived in exploiting it but it was unable to be exploited then I thought it would be false positive result from my scanner, then after I thought how can I know if it is false positive or it was end of my ability in exploiting SQL injection, then it thought it is better to scan vulnerability by using more than one tool, then after I tried to learn how can I use another vulnerability scanner which is called paros, after knowing how to use it today am ready to share my experience to you.
  • 4. PAGE 3 TABLE OF CONTENTS CHAPTER ONE CONFIGURING PROXY ON BROWSER ...................................... 4 - 6 CHAPTER TWO START PAROS ........................................................................................7 CHAPTER THREE BROWSING TARGET WEB PAGES ........................................... 8 - 10 CHAPTER FOUR SCANNING VULNERABILITY..................................................11 - 13 CHAPTER FIVE ANALYSIS OF SCAN RESULTS ................................................14 - 15
  • 5. PAGE 4 CHAPTER ONE. CONFIGURING PROXY ON BROWSER. On the top right side of your browser, am using Mozilla Firefox, there is bar as shown in the figure 1, if you place cursor on it, it is highlighted as Open menu, click it and find preferences. Fig. 1. Fig. 2. After clicking on the preferences, your browser will look as it is shown in the figure 2, on above search field type
  • 6. PAGE 5 network, network proxy will come up as shown in the figure 3 then click on settings. Fig. 3. Fig. 4. Proxy uses 127.0.0.1:8080, that is IP address of the localhost and port it uses that is 8080, make sure everything is configured the same as shown in the figured 4.
  • 7. PAGE 6 Fig. 5. If you get any trouble try this, go on the top view of paros find tab called tools ➔ options, and check if above fields are filled as shown in the figure 5, just focus on the second option which is named local proxy.
  • 8. PAGE 7 CHAPTER TWO. START PAROS. There are two options to start paros, you can start paros from terminal or search it from menu, but you should make sure that proxy is well configured on your browser. Option to get and start paros ➔ Terminal. ➔ Search menu. Start paros on terminal. as shown on figure 6 or you can go to menu, search it and double click it to start paros. Fig. 6.
  • 9. PAGE 8 CHAPTER THREE. BROWSING TARGET WEB PAGES. Browse different pages of target so that all request can be intercepted by proxy and being sent to the proxy, make sure you browse a lot of pages so that many requests can be sent to paros. Important pages to browse.  Login forms.  Register forms.  Any other forms in the target site.  All application.  Subdomain, if any.  Uploading options. Those are the most sensitive pages to browse, and this is because they sent request direct to the server, they sent queries to the server, as proxy is available, those intercepted request may easily checked and analyzed. For my case, my target is localhost/DVWA/ so I will do the following. ➔ Browse in different pages.
  • 10. PAGE 9 Fig. 7. In the figure 7, I was trying to browse in different pages. ➔ Input data in input fields. Fig. 8. If target Web page have any input forms as shown in the figure 8, input any data then submit. ➔ Upload image.
  • 11. PAGE 10 Fig. 9. If web page got option to upload anything, just upload as shown in the figure 9, testing site had option which allow a client to upload images to the server. ➔ Checking all forms. Fig. 10. If there is any form which looks similar with the form shown in the figure 10, fill it and submit the input data.
  • 12. PAGE 11 CHAPTER FOUR. SCANNING VULNERABILITY. Fig. 11. Target directory structure has been spidered and is displayed under sites button and shown in the figure 11, from 3 to 10, those are requests browsed on the browser. On the top of figure 11 there is option named Analyse, click on it then the following options will appear ➔ Spider. ➔ Scan All. ➔ Scan. ➔ Scan Policy.
  • 13. PAGE 12 According to options above you can choose to scan all or scan, after clicking on one of those two options new window come up on paros screen as shown in the figure. Fig. 12. scanning is finished. Figure 12 shows scanning is in progress. Fig. 13. Figure 12 shows the scanning is completed and results for scanning are found from Report>Last Scan
  • 14. PAGE 13 Result. If you go back in the figure 11 you will see option Report, click on that then you will see Last Scan Report, that is where your scan is saved. Fig. 14. For more analysis of scan results change directory to /root/paros/session/LatestScannedReport.htm as shown in the figure 14, that is the directory where all scanned results by paros are stored. After scanning is completed you should be able to see scan result summary as shown in the figure. Fig. 15.
  • 15. PAGE 14 CHAPTER FIVE. ANALYSIS OF SCAN RESULTS. Fig. 16. Fig. 17. Site have directory browsing enabled as shown in the scan result in the figure 16 and how it looks like when pasted on the browser,
  • 16. PAGE 15 this means black hacker can browse different folders and files in the server, and this can lead to leakage of sensitive information which is undesirable in security point of view. System administrators should be carefully in their configuration which should not allow black hackers to view these files.
  • 17. PAGE 16 CONCLUSION. That is the end of this article about how to use paros scanner, thank you all for following this session untill the end, if you get any trouble contact us, but also if you have any issue let us know it, MoTech says you’re warm welcome for our services.
  • 18. PAGE 17 WAYS TO GET IN TOUCH WITH MoTech. Linkedin.com https://www.linkedin.com/in/motech-inc-720261191/ YouTube.com https://www.youtube.com/channel/UCtuaigKZF3okQnKON5RM1qQ Amazon.com https://www.amazon.com/s?k=noel+moses+mwadende&ref=nb_sb_n oss Github.com https://github.com/MoTechStore/ Scribd.com https://www.scribd.com/user/470459684/MoTech SlideShare.com https://www.slideshare.net/MoTechInc?utm_campaign=profiletracking&utm_ medium=sssite&utm_source=ssslideview
  • 19. PAGE 18 REFERENCES. 1. https://tools.kali.org/web-applications/paros 2. https://null-byte.wonderhowto.com/forum/hiob-using-paros-for- web-application-auditing-and-debugging-0158950/ 3. http://beginnerhack.blogspot.com/2013/08/paros-in-kali-linux.html 4. https://www.ehacking.net/2011/05/paros-proxy-web-application- security.html 5. https://sectools.org/tool/paros/