Table of Contents

Join Our Membership To Start Your Cybersecurity Journey Today!

How Sifter stacks and Automates Useful Penetration testing tools

sifter

There are many open-source penetration testing tools available to perform security auditing. The security professionals can get these tools from the official repositories of the creators of these tools. Since a platform like Github supports all sorts of Cybersecurity projects, finding the best penetration testing tools often becomes a tiresome job. However, there are developers who spend time to find and program these tools to make them executable from a single place. Sifter is one such platform that contains a number of useful penetration testing tools to perform different actions, such as open-source intelligence, reconnaissance, enumeration, vulnerabilities assessment, malware analysis, and exploitation tasks. The framework automates the process of selecting and running the integrated tools, making the execution part simpler and easier for the users.

How to Configure Sifter in Kali Linux?

The sifter can operate in all major distributions including Windows, Linux, Parrot, and Ubuntu systems. In this tutorial, we configure Sifter on a Kali Linux virtual machine. In order to configure Sifter on the host machine, clone the framework from the following Github repository.

git clone https://github.com/s1l3nt78/sifter.git

sifter cloning

After cloning, navigate to the sifter directory and change permissions for the installation file using the following commands.

cd sifter
chmod +x  install.sh

file permission change

In the next step, execute the installation file as shown below.

./install.sh

sifter installation

Since the Sifter is a combination of multiple tools and scripts, the installation process takes some time to download and configure the basic scripts and utilities on the host machine. After installing the required libraries and packages, the framework performs a self-test to validate the installation process.

self tests after installation

How to Run Sifter Framework

Once the Sifter is successfully installed, we can run it from the terminal using the following command.

sifter

The above command opens the following primary menu in the terminal.

sifter menu

The menu shows different options like hiding the user identity, defining target network hosts, and navigating to the modules menu. Since it’s a fresh installation, we need to define the target hosts by selecting the Edit Host List option from the list. A modified list containing the target hosts IP addresses is shown in the following screenshot.

sifter host list

After defining the host’s list, we can navigate to the Module Menu by selecting its sequence id (i-e 3).

sifter modules menu

There is a missing tools category at number 16 in the modules list. This section shows the list of penetration testing tools that are yet to be installed by the user.

missing tools

The missing tools can be installed by simply following the on-screen instructions of the Sifter framework. Each module category represents a unique set of tools. We can explore each module section to find out the available tools and apply them in penetration testing campaigns. For instance, if we open the Webapp Scanning module (At #9), we get the following related tools to perform the web applications security audit.

webapp scanning tools

If we select the Sitadel tool from the list, we are presented with some basic configurations that are required to initiate the scanning process. These configurations can be seen in the following screenshot.

target setting and other configuration

After configuring the tool and selecting the target host, the Sitadel tool scans the target host and displays the gathered information in the following format.

sitadel scan results

Similarly, if we explore the Vulnerability scanning module, we find the following listed tools in the arsenal.

yuki chan

The list contains some renowned web auditing tools like RapidScan, Yuki Chan, and Nettacker. We select the Yuki Chan as an example tool. After providing the web address, the tool automatically runs to analyze the target host and fetches the results. Following are few screenshots of the results gathered by the Yuki Chan vulnerability assessment tool.

WHO IS INFORMATION

ownership information

REGISTRY INFORMATION

registry information

SERVER INFORMATION

server informartion

OPEN PORTS INFORMATION

open ports information

Conclusion

Sifter is a nice effort to compile a list of useful penetration testing tools and automate their functionality. The framework is a combination of multiple useful penetration testing tools. A large set of tools requires decent space and memory to perform the desired operations. Therefore, Sifter is not an ideal choice for systems with limited physical resources.  Lack of ability to install the selected tools is another drawback of the Sifter framework.

Scroll to Top