Table of Contents

Join Our Membership To Start Your Cybersecurity Journey Today!

How to install and operate the YAWAST Tool in Kali

yawast

YAWAST is a python based toolkit that does in-depth analysis (detailed information gathering) of target web applications. The toolkit also indicates common vulnerabilities found during the information gathering process. The basic checks performed by YAWAST can be divided into following categories.

SSL/TLS information Gathering

YAWAST uses SSL Labs and SSLyze utilities to capture a long list of TLS/SSL related information and issues. The important TLS related information captured by YAWAST is as follows.

  • Certificates
  • Certificates chain
  • CAA records
  • Supported ciphers

Similarly, the significant SSL related information and issues captured by YAWAST are listed below.

  • Self-signed certificates
  • Expired certificates
  • Signatures (SHA1, MD5)
  • Cipher suites
  • OpenSSL CVE vulnerabilities (2014-0224, 2016-2107, 2019-1559)
  • LOGJAM vulnerability check
  • HEARTBLEED vulnerability test
  • GOLDENDOOGLE check
  • FREAK test
  • DROWN test
  • SWEET32 check

DNS Information Gathering

YAWAST can gather the following DNS related information.

  • IP Address
  • Ownership record
  • Mail Exchange (MX) record
  • Text (TXT) record
  • Name Server (NS) data
  • Certification Authority Authorization (CAA) record
  • Subdomain information
  • Service (SRV) record

MX record gives information about the mail servers working on behalf of domain name. TXT record may contain information about the sources outside the domain name. CAA record shows the authority responsible for issuing the certificate to the domain. Similarly, the SRV record is used to specify servers by host name and port numbers in DNS. This DNS information captured by YAWAST can be very handy in target enumeration (finding potential attack vectors).

Common Vulnerabilities Scanning

YAWAST has the ability of finding different security flaws in target web applications. These security flaws can be categorized according to the technology in place, such as Generic, PHP, ASP.NET, Nginx Apache, and WordPress. Some common security flaws under these categories are mentioned below.

Generic

  • User enumeration
  • Information disclosure
  • X-XSS protection check
  • Source control directories check
  • Cookies security test

Apache

  • Information disclosure (Modules, Versions, Certificates)

ASP.NET

  • Information disclosure (server, version, registered handlers)
  • axd, Elmah.axd check
  • Debugging information

WordPress

  • Version check
  • WP-JSON user enumeration

YAWAST Installation

YAWAST is supported by Windows and Linux OS. Linux users can install the toolkit using the following commands.

pip3 install -U nassl
pip3 install yawast

yawast installation

The above commands install the toolkit and all its dependencies.  The other method of installing YAWAST is by cloning the toolkit from Github repository and running the installation file using the following commands.

git clone https://github.com/adamcaudill/yawast.git

yawast cloning

cd yawast
chmod +x setup.py
python3 setup.py install

yawast installation

Run the following command to install all the YAWAST dependencies.

pip3 install –r requirements.txt

requirements installation

How YAWAST Works

Following is the basic command format to run YAWAST toolkit.

yawast <positional arguments> <target web address> <optional arguments>

The positional arguments can be viewed using the following help command.

yawast --help

yawast help

Currently, there are three positional arguments namely scan, dns, and ssl. The optional arguments for these positional arguments can be viewed using the following help commands.

yawast scan –h

scan help

yawast dns –h

dns help

yawas ssl –h

ssl help menu

The following scan command gathers target information along with issues mentioned in the scan category, such as session cookies vulnerabilities and header misconfiguration issues.

yawast scan <target web address>

Header Information

Header information

The header screenshot shows a lot of header’s misconfiguration that can be exploited by the attackers.

header issues

Session Cookies Information

cookies issues

The DNS record and related misconfigurations can be seen using the following DNS command.

yawast  dns <target web address>

DNS information

Similarly, the SSL/TLS record and related vulnerabilities can be analyzed using the following SSL/TLS command.

yawast ssl <target web address>

Summary

YAWAST is a powerful web analyzer that can gather a lot of useful information about target web application. The security auditors can further explore the vulnerabilities based on the gathered information.

Scroll to Top