Hackmanit / Web-Cache-Vulnerability-Scanner

Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hackmanit.de/).
Other
879 stars 129 forks source link

Installation failed #7

Closed brupdk closed 2 years ago

brupdk commented 2 years ago

Hi,

$ go get -u "https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner" go get: malformed module path "https:/github.com/Hackmanit/Web-Cache-Vulnerability-Scanner": invalid char ':'

JeffreyShran commented 2 years ago

To install it: go install github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/v2@latest

m10x commented 2 years ago

Hello @brupdk, sorry for taking so long! The Readme has an error, which will be fixed asap.

If you want to fetch it directly with go: Go version >= 1.17: go install -v github.com/Hackmanit/Web-Cache-Vulnerability-Scanner@latest Go version <= 1.16: go get -u github.com/Hackmanit/Web-Cache-Vulnerability-Scanner

The binary will have the path $GOPATH/bin/Web-Cache-Vulnerability-Scanner

To run the scanner you will need to specify a header wordlist (using the flag -hw /path/to/wordlist) and a parameter wordlist (using the flag -pw /path/to/wordlist). All the archives on the releases page contain 2 recommended wordlists https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/releases/latest Or you can find them here https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/tree/master/wordlists

@JeffreyShran Thanks for providing an answer. FYI: The module version of WCVS was decreased from V2 to V0/V1 as it shouldn't have been V2 in the first place. So the adjusted install command is stated at the beginning of my response.

m10x commented 2 years ago

The Issue is now closed because the Readme was finally updated: https://github.com/Hackmanit/Web-Cache-Vulnerability-Scanner/commit/218f0af30c80866a1bc1c4a51a05d3ed16b62137

Botami143 commented 2 years ago

Thanks for replay