Faraday introduces a new concept – IPE (Integrated Penetration–Test Environment) a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of the data generated during a security audit.
The main purpose of Faraday is to re–use the available tools in the community to take advantage of them in a multiuser way.
Designed for simplicity, users should notice no difference between their own terminal application and the one included in Faraday. Developed with a specialized set of functionalities that help users improve their own work. Do you remember yourself programming without an IDE? Well, Faraday does the same as an IDE does for you when programming, but from the perspective of a penetration test.
Faraday is a GUI application that consists of a ZSH terminal and a sidebar with details about your workspaces and hosts.
When Faraday supports the command you are running, it will automatically detect it and import the results. In the example below, the original nmap command that was entered was nmap –A 192.168.0.7, which Faraday converted on the fly.
Once the nmap scan is finished, double–clicking on the host under the Hosts tab will bring up details about the host, its services, and any vulnerabilities that were detected.
The excellent dirb utility is also supported by Faraday by default:
When the scan is finished, double–clicking on the host will bring up its details, including the directories that dirb detected.
Take a look in the
Faraday also includes a full–featured web interface that provides you, your team, and any other interested parties with an immense amount of information.