top of page

S.S.A_Vulnerability Scanner

Enter the S.S.A Vulnerability Scanner, a sophisticated tool designed to identify vulnerabilities in networked systems. Developed in Python & Perl, this scanner offers a combination of flexibility, efficiency, and depth, making it an invaluable asset for anyone serious about network security.

This scanner is particularly useful in routine security audits, post-deployment checks, or even educational settings where learning about network vulnerabilities is crucial.

Upon execution, the scanner begins by loading essential modules. This step is critical to ensure that all functions and features required for the scan are available. The script then initializes global variables and configurations, setting the stage for the scanning process.

Target Specification and Resolution

The script allows users to specify targets using command-line options. It then attempts to resolve these targets to IP addresses, a crucial step for network scanning. If a host cannot be resolved, the script marks it to be skipped, ensuring efficiency by not attempting to scan unreachable targets.

SSL and Port Checking

One of the key features of the scanner is its ability to check for SSL configurations and open ports. It uses the LW2 Perl module to initialize an SSL engine, which is crucial for testing servers that use HTTPS. The script verifies if the specified ports are open before proceeding with the scan, optimizing the process by focusing on active ports.

Cookie Handling and Virtual Hosts

The scanner can read cookies from a configuration file and add them to a cookie jar for subsequent requests. Additionally, it can handle virtual hosts (vhosts) by allowing the user to specify a vhost as part of the scan, which is essential for accurately scanning servers that host multiple domains.

Scanning Process

The script's scanning process is comprehensive:

  • It begins with a simple request to the root directory ("/") to gather basic information about the server.

  • It uses a plugin architecture, allowing it to load and execute various plugins that extend its scanning capabilities.

  • The scanner maintains counters for vulnerabilities and errors, ensuring that the results are accurate and informative.

  • strutshock: Tailored to detect the Struts Shock vulnerability, which impacts web applications built with the Apache Struts framework.

  • ssl: Focuses on SSL/TLS configurations, testing for weak ciphers, and outdated protocols that could compromise encrypted communications.

  • sitefiles: Scans for common files and directories that, if improperly managed, could leak information.

  • siebel: Siebel is an enterprise application, and this plugin looks for specific Siebel vulnerabilities.

  • paths: Is used to discover common paths that could lead to sensitive areas of a website.

  • outdated: This plugin is crucial in identifying outdated software that could be harboring known security flaws.

  • negotiate: handles the testing of HTTP Negotiate authentication methods for weaknesses.

  • fileops: Allows testing file operations on the web server, checking for improper permissions or access controls.

  • cgi: Targets CGI scripts, which are historically known for being a source of web security vulnerabilities.


Results are reported in a structured manner, with the scanner providing detailed output on each host it scans. It categorizes findings based on severity and type, giving users a clear understanding of their security posture.


The S.S.A Vulnerability Scanner is an intricate script that embodies the essence of a powerful network security tool. With its modular design, SSL capabilities, and comprehensive scanning and reporting features, it is an essential asset for any security professional or organization serious about their cybersecurity defenses.

Project Gallery

bottom of page