W3AF – Comparison with other tools
Download
Report
Transcript W3AF – Comparison with other tools
Penetration testing –
W3AF Tool
Pinzariu Marian – MISS 2
George Blendea – MISS 2
W3AF – About
• W3AF = Web Application Attack and Audit Framework
• Started in 2006 as an Open Source Project
• Licensed under GPLv2.0
• Entirely written using Python
• Recently the adopted development process was TDD
(Test Driven Development)
W3AF – Objectives
• Create the biggest community of Web Application
Hackers
• Become the best Open Source Web Application Scanner
• Become the best Web Application Exploitation
Framework
• Combine static code analysis and black box testing into
one framework
W3AF – Extensible with Plugins
W3AF – Vulnerability Detection (Over 200)
• SQL Injection
• Cross Site Scripting/Cross-Site Request Forgery
• DOM XSS
• Buffer Overflow
• Brute Force Authentication
• Click Jacking
• Cross Domain
• Command Injection
• XPath Injection
• … and so on
W3AF – Supported Platforms
• All Python supported platforms
• Has been tested in various Linux Distributions, Mac OSX,
FreeBSD and OpenBSD
• Windows compatible, but not officially supported
W3AF – Ranking on sectools.org
• From 125 tools
W3AF – Installation
W3AF Usage – Find XSS and SQL injections
• 1) Set Target URL
W3AF Usage – Find XSS and SQL injections
• 2) Activate plugins for vulnerabilities that we
want to detect
W3AF Usage – Find XSS and SQL injections
• 3) Save current settings (Optional)
W3AF Usage – Find XSS and SQL injections
• 4) Click “Play” and explore the results
USE CASE 1 – FULL AUDIT
• Contains scans for a number of vulnerabilities
•
Xss, sqli, csrf, brute force
USE CASE 1 – FULL AUDIT
• Results are offered in tree view after scan is completed
USE CASE 1 – FULL AUDIT
• Request and location is indicated
alongside the tree view
USE CASE 1 – FULL AUDIT
• The w3af UI also returns an URL
map on scan completion
USE CASE 2 – BRUTE FORCE – CONSOLE INTERFACE
• The console interface is straightforward
• For performing a bruteforce vulnerability scan the brutefoce plugins have to be enabled
• Auth plugins can also be enabled for a deeper scan
USE CASE 2 – BRUTE FORCE – CONSOLE INTERFACE
• Once the target is set we can run
the scan
W3AF – Comparison with other tools
• W3AF, Wapiti, Arachni, Websecurify, JSky
W3AF – Comparison with other tools
W3AF – Comparison with other tools
W3AF – Comparison with other tools
• 3/4
W3AF – Comparison with other tools
• Place 5/5
W3AF – Advantages/Disadvantages
• Advantage: very modular and flexible (python plugins are
easy to integrate)
• Disadvantage: not mature enough (number of false
negatives is still high - 2011)
Thank you for your time!