Skip to content
This repository has been archived by the owner on Jan 17, 2019. It is now read-only.

Functionality

Thomas Perkins edited this page Nov 29, 2016 · 5 revisions

Whitewidow has a total of 13 flags as of now.

Mandatory flags, that have to be run for the program to do anything:

-d/--default          (Scrapes Google for possible vulnerable sites)
-f/--file FILENAME    (Runs through the specified file list and tries to find vulnerabilities in the sites)
-s/--spider URL       (Opens the URL pulls all the URL redirects from that site, make sure it's a good URL)

Enumeration flags, these will help enumerate the program, or run the program in a certain way

-x/--run-x NUM         (Runs the program the specified amount of times in a dry/batch run)
--dry-run              (Runs the program but doesn't search the sites for vulnerabilities, prompts for input)
--batch                (Used in conjunction with dry run, doesn't prompt for input)

Anomity flags, these flags are for making yourself anonymous:

-p/--proxy IP:PORT     (Configure the program to run behind a proxy, must use the ":")
--rand-agent           (Use a random user agent header instead of the default)

Processing flags, these flags will process the already found sites and run them.

--sqlmap                (Will launch sqlmap and use the SQL_VULN.LOG file as the bulk file, will prompt you for your commands)
-D/--dork DORK          (Will run with your own custom dork)

Random and misc flags, these flags really have nothing to do with the programs functionality but will help with stuff, kinda..

-l/--legal               (Will display the legal information, full legal along with the terms of service)
-b/--banner              (Will hide whitewidows banner, meaning it won't display the version either)
--beep                   (Will create a beep everytime the program finds a SQL vulnerable site)

Future flags and possible updates, these flags are a future update, and possibly will be implemented into the program

--xss                        (If a program is found to not be SQL vulnerable, this will launch a random basic alert script from a constant, it will replace the `php?id=1` for example, one, at the end of the link with something like `<script>alert("XSS");</script>`, it will then connect to the page and check if pop alert happened. If it happened, that page is XSS vulnerable and will be logged.)
--rand-search-engine         (Will use a random search engine instead of Google from a constant. This may be default and maybe used as a "pick your search engine flag" instead)
-t/--tor                     (Will run the program through tor. You will need to have tor downloaded on the computer, and running on the computer first, it will then connect through tor)