SlideShare a Scribd company logo
NOEL MOSES MWADENDE
PAROS VULNERABILITY
SCANNER
HOW TO USE PAROS
PAGE 1
ABOUT THE AUTHOR
Noel Moses Mwadende is the passionate book and article
writer based of different books and articles concern
computer science in general, especially in cybersecurity and
machine learning, currently Noel is employed as youtuber
and book author at MoTech which is mini firm dealing with
provision of information technology services.
PAGE 2
INTRODUCTION.
It happen I had my vulnerability scanner reporting that
there was SQL injection in a website, I dived in exploiting it
but it was unable to be exploited then I thought it would be
false positive result from my scanner, then after I thought
how can I know if it is false positive or it was end of my ability
in exploiting SQL injection, then it thought it is better to scan
vulnerability by using more than one tool, then after I tried to
learn how can I use another vulnerability scanner which is
called paros, after knowing how to use it today am ready to
share my experience to you.
PAGE 3
TABLE OF CONTENTS
CHAPTER ONE
CONFIGURING PROXY ON BROWSER ...................................... 4 - 6
CHAPTER TWO
START PAROS ........................................................................................7
CHAPTER THREE
BROWSING TARGET WEB PAGES ........................................... 8 - 10
CHAPTER FOUR
SCANNING VULNERABILITY..................................................11 - 13
CHAPTER FIVE
ANALYSIS OF SCAN RESULTS ................................................14 - 15
PAGE 4
CHAPTER ONE.
CONFIGURING PROXY ON BROWSER.
On the top right side of your browser, am using Mozilla
Firefox, there is bar as shown in the figure 1, if you place
cursor on it, it is highlighted as Open menu, click it and
find preferences.
Fig. 1.
Fig. 2.
After clicking on the preferences, your browser will look as
it is shown in the figure 2, on above search field type
PAGE 5
network, network proxy will come up as shown in the figure
3 then click on settings.
Fig. 3.
Fig. 4.
Proxy uses 127.0.0.1:8080, that is IP address of the localhost
and port it uses that is 8080, make sure everything is
configured the same as shown in the figured 4.
PAGE 6
Fig. 5.
If you get any trouble try this, go on the top view of paros
find tab called tools ➔ options, and check if above fields
are filled as shown in the figure 5, just focus on the second
option which is named local proxy.
PAGE 7
CHAPTER TWO.
START PAROS.
There are two options to start paros, you can start paros
from terminal or search it from menu, but you should make
sure that proxy is well configured on your browser.
Option to get and start paros
➔ Terminal.
➔ Search menu.
Start paros on terminal. as shown on figure 6 or you can go
to menu, search it and double click it to start paros.
Fig. 6.
PAGE 8
CHAPTER THREE.
BROWSING TARGET WEB PAGES.
Browse different pages of target so that all request can be
intercepted by proxy and being sent to the proxy, make
sure you browse a lot of pages so that many requests can
be sent to paros.
Important pages to browse.
 Login forms.
 Register forms.
 Any other forms in the target site.
 All application.
 Subdomain, if any.
 Uploading options.
Those are the most sensitive pages to browse, and this is
because they sent request direct to the server, they sent
queries to the server, as proxy is available, those intercepted
request may easily checked and analyzed. For my case, my
target is localhost/DVWA/ so I will do the following.
➔ Browse in different pages.
PAGE 9
Fig. 7.
In the figure 7, I was trying to browse in different pages.
➔ Input data in input fields.
Fig. 8.
If target Web page have any input forms as shown in the
figure 8, input any data then submit.
➔ Upload image.
PAGE 10
Fig. 9.
If web page got option to upload anything, just upload as
shown in the figure 9, testing site had option which allow
a client to upload images to the server.
➔ Checking all forms.
Fig. 10.
If there is any form which looks similar with the form
shown in the figure 10, fill it and submit the input data.
PAGE 11
CHAPTER FOUR.
SCANNING VULNERABILITY.
Fig. 11.
Target directory structure has been spidered and is
displayed under sites button and shown in the figure 11,
from 3 to 10, those are requests browsed on the browser.
On the top of figure 11 there is option named Analyse,
click on it then the following options will appear
➔ Spider.
➔ Scan All.
➔ Scan.
➔ Scan Policy.
PAGE 12
According to options above you can choose to scan all or
scan, after clicking on one of those two options new
window come up on paros screen as shown in the figure.
Fig. 12.
scanning is finished. Figure 12 shows scanning is in
progress.
Fig. 13.
Figure 12 shows the scanning is completed and
results for scanning are found from Report>Last Scan
PAGE 13
Result. If you go back in the figure 11 you will see option
Report, click on that then you will see Last Scan Report,
that is where your scan is saved.
Fig. 14.
For more analysis of scan results change directory to
/root/paros/session/LatestScannedReport.htm as shown in
the figure 14, that is the directory where all scanned results
by paros are stored.
After scanning is completed you should be able to see scan
result summary as shown in the figure.
Fig. 15.
PAGE 14
CHAPTER FIVE.
ANALYSIS OF SCAN RESULTS.
Fig. 16.
Fig. 17.
Site have directory browsing enabled as shown in the scan result in
the figure 16 and how it looks like when pasted on the browser,
PAGE 15
this means black hacker can browse different folders and files in
the server, and this can lead to leakage of sensitive information
which is undesirable in security point of view. System
administrators should be carefully in their configuration which
should not allow black hackers to view these files.
PAGE 16
CONCLUSION.
That is the end of this article about how to use paros
scanner, thank you all for following this session untill the
end, if you get any trouble contact us, but also if you have
any issue let us know it, MoTech says you’re warm
welcome for our services.
PAGE 17
WAYS TO GET IN TOUCH WITH MoTech.
Linkedin.com
https://www.linkedin.com/in/motech-inc-720261191/
YouTube.com
https://www.youtube.com/channel/UCtuaigKZF3okQnKON5RM1qQ
Amazon.com
https://www.amazon.com/s?k=noel+moses+mwadende&ref=nb_sb_n oss
Github.com
https://github.com/MoTechStore/
Scribd.com
https://www.scribd.com/user/470459684/MoTech
SlideShare.com
https://www.slideshare.net/MoTechInc?utm_campaign=profiletracking&utm_
medium=sssite&utm_source=ssslideview
PAGE 18
REFERENCES.
1. https://tools.kali.org/web-applications/paros
2. https://null-byte.wonderhowto.com/forum/hiob-using-paros-for-
web-application-auditing-and-debugging-0158950/
3. http://beginnerhack.blogspot.com/2013/08/paros-in-kali-linux.html
4. https://www.ehacking.net/2011/05/paros-proxy-web-application-
security.html
5. https://sectools.org/tool/paros/
PAGE 19

More Related Content

PDF
Girl Scouts Website Designer Badge Seminar - Workbook
PDF
Burp suite
PDF
Details Description of Load Runner Recording option
PDF
Virtualización de Escriorios VMWare View 5
PDF
Sql server reporting services (SSRS)
PDF
How to fix the error this site can’t be reached
PDF
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
PDF
How to fix err connection reset error
Girl Scouts Website Designer Badge Seminar - Workbook
Burp suite
Details Description of Load Runner Recording option
Virtualización de Escriorios VMWare View 5
Sql server reporting services (SSRS)
How to fix the error this site can’t be reached
IBM MobileFirst Platform v7.0 POT Offers Lab v1.0
How to fix err connection reset error

Similar to Paros vulnerability scanner (20)

PDF
7- How to Configure Disk Quota
PDF
sts-scanner_tutorial
PDF
sts-scanner_tutorial
PDF
PDF
Call your key to phone all
PDF
Getting started-with-oracle-so a-viii
PDF
Share point 2010 enterprise single server farm installation
PDF
Share point 2010 enterprise single server farm installation
DOC
Project Report on Cloud Storage
PPTX
First lesson
PDF
Intro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twist
PDF
SharePoint2010 single server farm installation
PDF
Oracle ADF 11g Tutorial
PDF
Accessblockedsites
PDF
Intro to IBM Bluemix DevOps Services, an open lab for IBM InterConnect
PDF
Client Server Live Hosting Documentation
PDF
Search
PDF
Troubleshooting guide
PDF
Troubleshooting guide
7- How to Configure Disk Quota
sts-scanner_tutorial
sts-scanner_tutorial
Call your key to phone all
Getting started-with-oracle-so a-viii
Share point 2010 enterprise single server farm installation
Share point 2010 enterprise single server farm installation
Project Report on Cloud Storage
First lesson
Intro to IBM Bluemix DevOps Services, a Workshop with a Cloudant twist
SharePoint2010 single server farm installation
Oracle ADF 11g Tutorial
Accessblockedsites
Intro to IBM Bluemix DevOps Services, an open lab for IBM InterConnect
Client Server Live Hosting Documentation
Search
Troubleshooting guide
Troubleshooting guide
Ad

More from MoTechInc (7)

PDF
Make device image in forensic
PDF
Simplified c++ 40 programs
PDF
Pandas tool for data scientist
PDF
Introduction to machine learning
PDF
Zip password cracker
PDF
Nltk installation guide
PDF
Information gathering
Make device image in forensic
Simplified c++ 40 programs
Pandas tool for data scientist
Introduction to machine learning
Zip password cracker
Nltk installation guide
Information gathering
Ad

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Spectroscopy.pptx food analysis technology
Approach and Philosophy of On baking technology
Advanced methodologies resolving dimensionality complications for autism neur...
MIND Revenue Release Quarter 2 2025 Press Release
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation
Mobile App Security Testing_ A Comprehensive Guide.pdf
sap open course for s4hana steps from ECC to s4
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Agricultural_Statistics_at_a_Glance_2022_0.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Weekly Chronicles - August'25-Week II
Encapsulation_ Review paper, used for researhc scholars
Spectroscopy.pptx food analysis technology

Paros vulnerability scanner

  • 1. NOEL MOSES MWADENDE PAROS VULNERABILITY SCANNER HOW TO USE PAROS
  • 2. PAGE 1 ABOUT THE AUTHOR Noel Moses Mwadende is the passionate book and article writer based of different books and articles concern computer science in general, especially in cybersecurity and machine learning, currently Noel is employed as youtuber and book author at MoTech which is mini firm dealing with provision of information technology services.
  • 3. PAGE 2 INTRODUCTION. It happen I had my vulnerability scanner reporting that there was SQL injection in a website, I dived in exploiting it but it was unable to be exploited then I thought it would be false positive result from my scanner, then after I thought how can I know if it is false positive or it was end of my ability in exploiting SQL injection, then it thought it is better to scan vulnerability by using more than one tool, then after I tried to learn how can I use another vulnerability scanner which is called paros, after knowing how to use it today am ready to share my experience to you.
  • 4. PAGE 3 TABLE OF CONTENTS CHAPTER ONE CONFIGURING PROXY ON BROWSER ...................................... 4 - 6 CHAPTER TWO START PAROS ........................................................................................7 CHAPTER THREE BROWSING TARGET WEB PAGES ........................................... 8 - 10 CHAPTER FOUR SCANNING VULNERABILITY..................................................11 - 13 CHAPTER FIVE ANALYSIS OF SCAN RESULTS ................................................14 - 15
  • 5. PAGE 4 CHAPTER ONE. CONFIGURING PROXY ON BROWSER. On the top right side of your browser, am using Mozilla Firefox, there is bar as shown in the figure 1, if you place cursor on it, it is highlighted as Open menu, click it and find preferences. Fig. 1. Fig. 2. After clicking on the preferences, your browser will look as it is shown in the figure 2, on above search field type
  • 6. PAGE 5 network, network proxy will come up as shown in the figure 3 then click on settings. Fig. 3. Fig. 4. Proxy uses 127.0.0.1:8080, that is IP address of the localhost and port it uses that is 8080, make sure everything is configured the same as shown in the figured 4.
  • 7. PAGE 6 Fig. 5. If you get any trouble try this, go on the top view of paros find tab called tools ➔ options, and check if above fields are filled as shown in the figure 5, just focus on the second option which is named local proxy.
  • 8. PAGE 7 CHAPTER TWO. START PAROS. There are two options to start paros, you can start paros from terminal or search it from menu, but you should make sure that proxy is well configured on your browser. Option to get and start paros ➔ Terminal. ➔ Search menu. Start paros on terminal. as shown on figure 6 or you can go to menu, search it and double click it to start paros. Fig. 6.
  • 9. PAGE 8 CHAPTER THREE. BROWSING TARGET WEB PAGES. Browse different pages of target so that all request can be intercepted by proxy and being sent to the proxy, make sure you browse a lot of pages so that many requests can be sent to paros. Important pages to browse.  Login forms.  Register forms.  Any other forms in the target site.  All application.  Subdomain, if any.  Uploading options. Those are the most sensitive pages to browse, and this is because they sent request direct to the server, they sent queries to the server, as proxy is available, those intercepted request may easily checked and analyzed. For my case, my target is localhost/DVWA/ so I will do the following. ➔ Browse in different pages.
  • 10. PAGE 9 Fig. 7. In the figure 7, I was trying to browse in different pages. ➔ Input data in input fields. Fig. 8. If target Web page have any input forms as shown in the figure 8, input any data then submit. ➔ Upload image.
  • 11. PAGE 10 Fig. 9. If web page got option to upload anything, just upload as shown in the figure 9, testing site had option which allow a client to upload images to the server. ➔ Checking all forms. Fig. 10. If there is any form which looks similar with the form shown in the figure 10, fill it and submit the input data.
  • 12. PAGE 11 CHAPTER FOUR. SCANNING VULNERABILITY. Fig. 11. Target directory structure has been spidered and is displayed under sites button and shown in the figure 11, from 3 to 10, those are requests browsed on the browser. On the top of figure 11 there is option named Analyse, click on it then the following options will appear ➔ Spider. ➔ Scan All. ➔ Scan. ➔ Scan Policy.
  • 13. PAGE 12 According to options above you can choose to scan all or scan, after clicking on one of those two options new window come up on paros screen as shown in the figure. Fig. 12. scanning is finished. Figure 12 shows scanning is in progress. Fig. 13. Figure 12 shows the scanning is completed and results for scanning are found from Report>Last Scan
  • 14. PAGE 13 Result. If you go back in the figure 11 you will see option Report, click on that then you will see Last Scan Report, that is where your scan is saved. Fig. 14. For more analysis of scan results change directory to /root/paros/session/LatestScannedReport.htm as shown in the figure 14, that is the directory where all scanned results by paros are stored. After scanning is completed you should be able to see scan result summary as shown in the figure. Fig. 15.
  • 15. PAGE 14 CHAPTER FIVE. ANALYSIS OF SCAN RESULTS. Fig. 16. Fig. 17. Site have directory browsing enabled as shown in the scan result in the figure 16 and how it looks like when pasted on the browser,
  • 16. PAGE 15 this means black hacker can browse different folders and files in the server, and this can lead to leakage of sensitive information which is undesirable in security point of view. System administrators should be carefully in their configuration which should not allow black hackers to view these files.
  • 17. PAGE 16 CONCLUSION. That is the end of this article about how to use paros scanner, thank you all for following this session untill the end, if you get any trouble contact us, but also if you have any issue let us know it, MoTech says you’re warm welcome for our services.
  • 18. PAGE 17 WAYS TO GET IN TOUCH WITH MoTech. Linkedin.com https://www.linkedin.com/in/motech-inc-720261191/ YouTube.com https://www.youtube.com/channel/UCtuaigKZF3okQnKON5RM1qQ Amazon.com https://www.amazon.com/s?k=noel+moses+mwadende&ref=nb_sb_n oss Github.com https://github.com/MoTechStore/ Scribd.com https://www.scribd.com/user/470459684/MoTech SlideShare.com https://www.slideshare.net/MoTechInc?utm_campaign=profiletracking&utm_ medium=sssite&utm_source=ssslideview
  • 19. PAGE 18 REFERENCES. 1. https://tools.kali.org/web-applications/paros 2. https://null-byte.wonderhowto.com/forum/hiob-using-paros-for- web-application-auditing-and-debugging-0158950/ 3. http://beginnerhack.blogspot.com/2013/08/paros-in-kali-linux.html 4. https://www.ehacking.net/2011/05/paros-proxy-web-application- security.html 5. https://sectools.org/tool/paros/