Running Your First Scan¶
Some tips before you start the scan
You can slowdown or speedup the scan by provide a --tactic
or --threads-hole
command line flag?
By default the threads hold for the workflow will equals of your number of CPUs, but you can change it by using --threads-hold=20
. You can also use --tactic=gently
flag to slowdown or the --tactic=aggressive
speedup the scan.
for example: osmedeus scan --threads-hold=10 -t example.com
Running the command osmedeus workflow ls
to show full workflow and osmedeus scan -hh
to see the full help of the scan command
To avoid encountering errors, it is important to ensure that the scan is executed using the correct input format.
If you workflow is a domain or a list of subdomains¶
Example inputs: example.com
, target.co.uk
If your input is
sub.example.com
and you are aware that there are not many subdomains associated with it (such asanother.sub.example.com
), then it may be more advantageous to employ a different workflow.
1. If you desire a comprehensive scan that encompasses subdomain enumeration, DNS probing, and vulnerability scanning
Example commands
# running default flow -f 'general'
osmedeus scan -t example.com
# Running extensive reconnaissance routine with in-depth module + bigger wordlists
osmedeus scan -f extensive -t example.com
2. If you desire to perform a quick summary data analysis to get subdomain and DNS probing only
Example commands
osmedeus scan -f fast -t example.com
# only run subdomain enumeration
osmedeus scan -f subdomain-enum -t example.com
osmedeus scan -m brutefocing-subdomain -t example.com
3. If you desire to perform a rapid routine and conducting a vulnerability scan on ity
Example commands
osmedeus scan -f vuln -t example.com
If you workflow is a URL or a list of URLs¶
Example inputs: Your input is a file that includes a catalog of URLs or IP addresses, along with subdomains such as https://sub.example.com
, internal.app.example.com
, https://evil.com/path
, https://1.2.3.4
, 3.4.5.6
, etc
The workflows listed below solely permit input in the form of a file. If your input is not in the file format, kindly arrange it in a file prior to execution.
Example commands
osmedeus scan -f urls -t list-of-urls.txt
osmedeus scan -f domains -t list-of-domains.txt
# using with module
osmedeus scan -m http-probing -t list-of-domains.txt
osmedeus scan -m vuln-scan -t list-of-domains.txt
osmedeus scan -m content-discovery -t list-of-domains.txt
osmedeus scan -m content-discovery -t list-of-urls.txt
If you workflow is a CIDR or a list of CIDRs¶
Example inputs: Your input is a file that includes a catalog of IP addresses, CIDR such as 1.2.3.4/24
, 3.4.5.6
, etc or a simple CIDR like 1.2.3.4/24
Example commands
osmedeus scan -f cidr -t 1.2.3.4/24
osmedeus scan -f cidr -t list-of-cidr.txt
osmedeus scan -f cidr-probing -t 3.4.5.6/24
If you workflow is a github/gitlab repo or a folder of source¶
Example inputs: https://github.com/juice-shop/juice-shop
, /tmp/source-code-folder
Example commands
osmedeus scan -m repo-scan -t https://github.com/juice-shop/juice-shop
osmedeus scan -m repo-scan -t /tmp/source-code-folder
osmedeus scan -m repo-scan -T list-of-repos.txt