+ All Categories

w3af

Date post: 09-Jun-2015
Category:
Upload: nu-the-open-security-community
View: 1,425 times
Download: 6 times
Share this document with a friend
Description:
w3af by Prajwal Panchmahalkar @ null Hyderabad Meet, August, 2010
Popular Tags:
13
Web Application Web Application Attack Attack and Audit Framework and Audit Framework By Prajwal Panchmahalkar
Transcript
Page 1: w3af

Web Application AttackWeb Application Attackand Audit Frameworkand Audit Framework

By Prajwal Panchmahalkar

Page 2: w3af

W3af is a well known web attack and auditing framework.

•Very similar to Metasploit framework

W3af combines all necessary actions for a complete web attack.

•Mapping•Discovery•Exploitation

This puts the framework into three major plug-ins.

Page 3: w3af

Web Service Support Exploits

•SQL injections(blind)

• OS commanding

• remote file inclusions

• local file inclusions

• XSS and more

A good harmony among plug-ins.

Page 4: w3af

Discovery PluginDiscovery Plugin•URLS•Injection Points

Audit PluginAudit Plugin•Uses the above injection points•Sends crafted data to find vulnerabilities

Exploit PluginExploit Plugin•Exploits vulnerabilities found•Provides SQL dumps / remote shell is returned

Page 5: w3af
Page 6: w3af
Page 7: w3af

Find all the URLs

•Create Fuzzable requestPlugins:

•WebSpider

•URL fuzzer

•Pykto

•GoogleFuzzer

Page 8: w3af

They use the discovery plug-in outputs and find their respective vulnerabilities

•SQL Injection (blind)

•XSS

•Buffer Overflow

•Response Splitting

Page 9: w3af

Grep every HTTP request and response

•findComments•passwordProfiling•privateIP•DirectoryIndexing•Getmails•lang

Page 10: w3af

BruteForce•Bruteforce logins

Evasion•Modify the request to evade IDS detection

Mangle•Modify requests/responses based on regular expressions.

Output•Write logs .

Page 11: w3af

Prajwal Panchmahalkar

Team : Matriux ,n|u

[email protected]

Page 12: w3af

THANKS TOTHANKS TO

ALLALL

Page 13: w3af

Recommended