Quick Start Guide
Get up and running with Apache Sling Auditor in minutes.
Your First Scan
The simplest way to scan a target:
1
python auditor.py -t http://target.com:4502
This will:
- Run a full scan with all checks enabled
- Display results in real-time with color-coded severity
- Save a detailed JSON report to
1
scan_results/
Basic Examples
1. Quick Security Check
Fast scan focusing on critical vulnerabilities:
1
python auditor.py -t http://target.com:4502 --mode quick
What it does:
- Tests critical vulnerabilities only
- Basic version detection
- Authentication checks
- Takes 1-3 minutes
2. Authenticated Scan
Scan with credentials:
1
2
3
4
python auditor.py -t https://target.com:4503 \
-u admin \
-p password \
-v
What it does:
- Uses provided credentials for authenticated endpoints
- Tests protected paths that require authentication
- Verbose output for detailed information
Note: Default credentials from are only tested if authentication-required paths (401/403) are detected first. For guaranteed credential testing, use the 1
config/audit_config.yaml
and 1
-u
flags directly.1
-p
3. Stealth Scan
Low-profile scanning:
1
python auditor.py -t http://target.com:4502 --mode stealth
What it does:
- Minimal requests per second
- Passive detection only
- Safe, non-intrusive checks
- Takes longer but less detectable
4. With Wordlist Enumeration
Discover accessible paths:
1
2
python auditor.py -t http://target.com:4502 \
--wordlist wordlists/sling_paths.txt
What it does:
- Tests all paths in the wordlist
- Categorizes responses (200, 401, 403, 404)
- Reports exposed and protected paths
5. Exploitation Mode
Generate PoCs for detected vulnerabilities:
1
python auditor.py -t http://target.com:4502 --exploit
What it does:
- Actively exploits detected vulnerabilities
- Generates HTML PoC files for XSS
- Attempts file reading for Path Traversal
- Tests SSRF with internal resources
6. Brute Force Testing
Test login credentials:
1
2
3
4
python auditor.py -t http://target.com:4502 \
--brute-force \
--username-wordlist wordlists/usernames.txt \
--password-wordlist wordlists/passwords.txt
What it does:
- Tests username/password combinations
- Supports form-based and Basic auth
- Includes rate limiting
- Reports valid credentials
Understanding Output
Console Output
The auditor provides real-time feedback:
1
2
3
4
5
6
7
8
[INFO] Starting scan...
[INFO] Version detection...
[CRITICAL] Found CRITICAL severity issue: Log4Shell
Path: /system/console
Description: Potential Log4Shell vulnerability detected
[HIGH] Found HIGH severity issue: Exposed OSGI Console
Path: /system/console
Description: OSGI Console is publicly accessible
Severity Colors:
- 🔴 CRITICAL - Red
- 🟡 HIGH - Yellow
- 🔵 MEDIUM - Cyan
- 🟢 LOW - Green
- ⚪ INFO - White
Report Location
After scanning, find your report at:
1
scan_results/YYYYMMDD_HHMMSS/detailed_report.json
Example: 1
scan_results/20241123_143224/detailed_report.json
Common Scenarios
Scenario 1: Initial Reconnaissance
1
2
# Quick scan to identify obvious issues
python auditor.py -t http://target.com:4502 --mode quick -v
Scenario 2: Comprehensive Audit
1
2
3
4
5
6
# Full scan with all features
python auditor.py -t http://target.com:4502 \
--mode full \
--wordlist wordlists/sling_paths_extended.txt \
--exploit \
--verbose
Scenario 3: Covert Assessment
1
2
3
4
5
# Stealth scan through proxy
python auditor.py -t https://target.com:4503 \
--mode stealth \
--proxy http://127.0.0.1:8080 \
--user-agent "Mozilla/5.0 (Windows NT 10.0; Win64; x64)"
Scenario 4: Credential Testing
1
2
3
4
5
6
# Brute force with custom wordlists
python auditor.py -t http://target.com:4502 \
--brute-force \
--username-wordlist /path/to/usernames.txt \
--password-wordlist /path/to/passwords.txt \
-u admin -p admin # Test default first
Command-Line Options Quick Reference
| Option | Short | Description | ||||||||
|---|---|---|---|---|---|---|---|---|---|---|
|
|
Target URL (required) | ||||||||
|
 | Scan mode: , , |
||||||||
|
|
Username for authentication | ||||||||
|
|
Password for authentication | ||||||||
|
 | Path to wordlist file | ||||||||
|
 | Enable exploitation mode | ||||||||
|
 | Enable brute force testing | ||||||||
|
|
Enable verbose output | ||||||||
|
 | Proxy URL | ||||||||
|
 | Number of concurrent threads | ||||||||
|
|
Request timeout in seconds | ||||||||
|
|
Allow insecure SSL |
Next Steps
Now that you’ve run your first scan:
- Read the Usage Guide - Learn advanced features
- Explore Configuration - Customize scans
- Check CVE Detection - Understand detected vulnerabilities
- Review Examples - See more use cases
Tips for Success
✅ Always get permission before scanning any system
✅ Start with quick mode to get an overview
✅ Use verbose mode () for detailed information1
-v
✅ Save reports - They’re automatically saved to 1
scan_results/
✅ Review JSON reports - They contain more details than console output
✅ Use wordlists - They help discover hidden paths
✅ Test with exploitation - Validate vulnerabilities with 1
--exploit
Troubleshooting
Scan takes too long?
- Use
for faster scans1
--mode quick
- Reduce
if target is slow1
--threads
- Increase
if getting timeouts1
--timeout
Too many false positives?
- Use
for more accurate results1
--mode stealth
- Review configuration in
1
config/audit_config.yaml
- Check verbose output for details
Connection errors?
- Verify target URL is correct
- Check network connectivity
- Use
flag for SSL issues1
-k
- Try increasing
1
--timeout
Ready for more? Check out the Complete Usage Guide!