Quick Start Guide

Get up and running with Apache Sling Auditor in minutes.

Your First Scan

The simplest way to scan a target:

1
python auditor.py -t http://target.com:4502

This will:

Basic Examples

1. Quick Security Check

Fast scan focusing on critical vulnerabilities:

1
python auditor.py -t http://target.com:4502 --mode quick

What it does:

2. Authenticated Scan

Scan with credentials:

1
2
3
4
python auditor.py -t https://target.com:4503 \
  -u admin \
  -p password \
  -v

What it does:

Note: Default credentials from

1
config/audit_config.yaml
are only tested if authentication-required paths (401/403) are detected first. For guaranteed credential testing, use the
1
-u
and
1
-p
flags directly.

3. Stealth Scan

Low-profile scanning:

1
python auditor.py -t http://target.com:4502 --mode stealth

What it does:

4. With Wordlist Enumeration

Discover accessible paths:

1
2
python auditor.py -t http://target.com:4502 \
  --wordlist wordlists/sling_paths.txt

What it does:

5. Exploitation Mode

Generate PoCs for detected vulnerabilities:

1
python auditor.py -t http://target.com:4502 --exploit

What it does:

6. Brute Force Testing

Test login credentials:

1
2
3
4
python auditor.py -t http://target.com:4502 \
  --brute-force \
  --username-wordlist wordlists/usernames.txt \
  --password-wordlist wordlists/passwords.txt

What it does:

Understanding Output

Console Output

The auditor provides real-time feedback:

1
2
3
4
5
6
7
8
[INFO] Starting scan...
[INFO] Version detection...
[CRITICAL] Found CRITICAL severity issue: Log4Shell
  Path: /system/console
  Description: Potential Log4Shell vulnerability detected
[HIGH] Found HIGH severity issue: Exposed OSGI Console
  Path: /system/console
  Description: OSGI Console is publicly accessible

Severity Colors:

Report Location

After scanning, find your report at:

1
scan_results/YYYYMMDD_HHMMSS/detailed_report.json

Example:

1
scan_results/20241123_143224/detailed_report.json

Common Scenarios

Scenario 1: Initial Reconnaissance

1
2
# Quick scan to identify obvious issues
python auditor.py -t http://target.com:4502 --mode quick -v

Scenario 2: Comprehensive Audit

1
2
3
4
5
6
# Full scan with all features
python auditor.py -t http://target.com:4502 \
  --mode full \
  --wordlist wordlists/sling_paths_extended.txt \
  --exploit \
  --verbose

Scenario 3: Covert Assessment

1
2
3
4
5
# Stealth scan through proxy
python auditor.py -t https://target.com:4503 \
  --mode stealth \
  --proxy http://127.0.0.1:8080 \
  --user-agent "Mozilla/5.0 (Windows NT 10.0; Win64; x64)"

Scenario 4: Credential Testing

1
2
3
4
5
6
# Brute force with custom wordlists
python auditor.py -t http://target.com:4502 \
  --brute-force \
  --username-wordlist /path/to/usernames.txt \
  --password-wordlist /path/to/passwords.txt \
  -u admin -p admin  # Test default first

Command-Line Options Quick Reference

Option Short Description
1
--target
1
-t
Target URL (required)
1
--mode
  Scan mode:
1
quick
,
1
full
,
1
stealth
1
--username
1
-u
Username for authentication
1
--password
1
-p
Password for authentication
1
--wordlist
  Path to wordlist file
1
--exploit
  Enable exploitation mode
1
--brute-force
  Enable brute force testing
1
--verbose
1
-v
Enable verbose output
1
--proxy
  Proxy URL
1
--threads
  Number of concurrent threads
1
--timeout
1
-T
Request timeout in seconds
1
--insecure
1
-k
Allow insecure SSL

Next Steps

Now that you’ve run your first scan:

  1. Read the Usage Guide - Learn advanced features
  2. Explore Configuration - Customize scans
  3. Check CVE Detection - Understand detected vulnerabilities
  4. Review Examples - See more use cases

Tips for Success

✅ Always get permission before scanning any system
✅ Start with quick mode to get an overview
✅ Use verbose mode (

1
-v
) for detailed information
✅ Save reports - They’re automatically saved to
1
scan_results/

✅ Review JSON reports - They contain more details than console output
✅ Use wordlists - They help discover hidden paths
✅ Test with exploitation - Validate vulnerabilities with
1
--exploit

Troubleshooting

Scan takes too long?

Too many false positives?

Connection errors?


Ready for more? Check out the Complete Usage Guide!