SlideShare a Scribd company logo
1 of 23
ACTIVE LEARNING ASSIGNMENT
SUBJECT : Cyber Security (2150002)
TOPIC : Web application attack and audit framework (w3af)
Branch : Electrical Engineering
Prepared By :- Kaveesh Raval (140120109016)
Harsh Dedakia (140120109012)
Abhishek Choksi (140120109005)
Himal Desai (140120109008)
Guided By:- Prof. Abhishek Harit
Gandhinagar Institute of Technology
w3af (web application attack and audit framework) is an open-
source web application security scanner. The project provides
a vulnerability scanner and exploitation tool for Web applications. It
provides information about security vulnerabilities and aids in
penetration testing efforts. Users have the choice between a graphic
user interface and a command-line interface.
w3af identifies most web application vulnerabilities using more than
130 plug-ins. After identification, vulnerabilities like (blind) SQL
injections, OS commanding, remote file inclusions (PHP), cross-site
scripting (XSS), and unsafe file uploads, can be exploited in order to
gain different types of access to the remote system.
1.Menu bar
2.Toolbar
3.Notebook Tabs
4.Toolbar
5.Found elements
 In the notebook tab at the program beginning, there are three
vertical panels:
6. The profiles
7. The Plugin Selector
8. The Plugin Configuration Area
9. Target URL 
To scan the web sites in different ways there are different plugins that can be
configured in different ways.
The first section has all the scan plugins, in the upper part of the column [1].
There you have the different plugins grouped regarding the scan type. They are
separated in:
•Audit
•Brute force
•Crawl
•Infrastructure
•Evasion
•Grep
•Mangle
•Output
If you select on any plugin you will see in the right panel [3] some information of
that plugin. To configure the plugin, just select it, and modify the options that
appears on in the right panel [3]. Note that you need to Save the configuration to
use it. If you make right-click over a plugin (or select Edit Plugin in the Edit
menu), a text editor will open and you’ll be able to actually edit the plugin source
code.
In the profiles you can save different configurations. You can think a Profile as a
collection of configured plugins and target URL.
To actually run the scan some conditions need to be met: at least one plugin
needs to be activated, and a target URL must be set. You’ll notice that
everything is OK to go, because the Start button will be enabled.
When the scanning process is started, the system will switch automatically to
the Log tab. In this tab you can see how the scan evolves through the different
indicators.
This tab has two main sections. In the upper part you have the logging text,
where you can see all the information generated by the system. In the principal
section of that part [1] you can see all the messages generated by the system,
from the first one to the last generated. 
As this log is normally a large quantity of text, you can enable and disable the
different type of messages, using the checkboxes in the log bar [4].
All this information is updated in real time. For a better visual following of the
process, you also have, at the right of the toolbar, three indicators showing the
quantity of information items found, of vulnerabilities found, and the shell which
were successfully exploited
You can explore and analyze the scanning results after the scan process is
completed (or before it’s finished, because the system let’s you work
concurrently with that process). 
There’s a complete tab for results in w3af, and as there’re a lot of information to
analyze, this tab is also divided in tabs, as you can check the Knowledge Base,
see the site structure, or navigate through the individual requests and responses.
The Knowledge Base is a collection of discovered items, that can be classified in
Vulnerabilities, Information, and other stuff. The KB Browser tab lets you dive
into this information.
In the left part of the window [1] you’ll find the information of the Knowledge
Base. By default it only shows you the vulnerabilities and information, but you
can enable also the miscellaneous stuff or hide any of them, using the
checkboxes above the info [2].
The information is grouped in a tree way, but you have different nodes to
expand. If you select one of the items, and that item corresponds to a HTTP
request originated by the scanning, you will see in the right part of the window
all the information about that request and its response (more info about this
below).
The items in the tree has a color that indicates the severity of the issue: black for
information, orange for low-severity vulnerabilities, and red for medium or high
severity ones.
Above everything [3] you have general information about when the request was
found (actually, this is the same line that you can find in the logs regarding this
request). Below that info you have the request headers [4], the request body [5],
the response headers [6], and the response body [7].
The URLs tab shows the structure of the site that the system worked on. It’s
separated In two parts, but both parts show actually the same information,
although they show it in different ways.
In this window you will be able to search for any request (and the associated
response) that the system had generated during the scanning.
In the upper text entry [1] you can insert a query to search the knowledge
database for requests and responses. 
After you enter the query, and hit the Find button, the system will retrieve all the
requests and responses that match, and will present them to you in the results list
[2]. If you click on any of those results, you’ll see the request and response
details [3].
This window is separated in different panels. At the very left [1] you have a list of
all the exploits that you can execute over the vulnerabilities that you found,
which are listed in the second column [2]. You can see there that we found three
vulnerabilities, as you can also check in the left bottom corner of the window [3].
At the right part of the window, there’re two panels: one [4] for the exploited
shells.
Finally, you can see that when you enter to this tab, the Multiple Exploit button in
the toolbar [6] is enabled.
Exploits act on vulnerabilities. But not all exploits act on every vulnerabilities.
To exploit a vulnerability, you need to drag the exploit and drop it on the
vulnerability you want to exploit. This drag & drop process is all you need to
activate one specific exploit.
If you want to trigger more than one exploit at once, you
should click on the Multiple Exploit button in the toolbar,
and a window will appear. There you can select all the
exploits that you want to trigger, and when you click on
the Execute button, the system will try all the marked
exploits on all the possible vulnerabilities. If you activate
the First successful checkbox, the system will stop after
the first time that an exploit succeeds when working on
any vulnerability.
REFERENCES
www.wikipedia.org/wiki/w3af
www.w3af.org
www.hackworld.com
Web application attack and audit framework (w3af)

More Related Content

What's hot

VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )Kashyap Mandaliya
 
Web application security
Web application securityWeb application security
Web application securityKapil Sharma
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksVi Tính Hoàng Nam
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxAjayKumar73315
 
Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Hossam .M Hamed
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applicationsAdeel Javaid
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerabilityA. Shamel
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationAlienVault
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodologyRashad Aliyev
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploitdevilback
 

What's hot (20)

DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )
 
Web application security
Web application securityWeb application security
Web application security
 
Ceh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networksCeh v5 module 15 hacking wireless networks
Ceh v5 module 15 hacking wireless networks
 
Owasp zap
Owasp zapOwasp zap
Owasp zap
 
Firewalls
FirewallsFirewalls
Firewalls
 
Overview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptxOverview of Vulnerability Scanning.pptx
Overview of Vulnerability Scanning.pptx
 
Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Hacking web applications
Hacking web applicationsHacking web applications
Hacking web applications
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM Installation
 
Cyber Security Threat Modeling
Cyber Security Threat ModelingCyber Security Threat Modeling
Cyber Security Threat Modeling
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Security testing
Security testingSecurity testing
Security testing
 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
 
Finalppt metasploit
Finalppt metasploitFinalppt metasploit
Finalppt metasploit
 
Wi-fi Hacking
Wi-fi HackingWi-fi Hacking
Wi-fi Hacking
 
Network attacks
Network attacksNetwork attacks
Network attacks
 

Similar to Web application attack and audit framework (w3af)

3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
 
Lesson 1 Basic Tutorial Data Analysis Software for Flow Cytometry
Lesson  1 Basic Tutorial Data Analysis Software for Flow CytometryLesson  1 Basic Tutorial Data Analysis Software for Flow Cytometry
Lesson 1 Basic Tutorial Data Analysis Software for Flow CytometryUttam Belbase
 
Logger Brute Force Attack Detection Security Use Case User's Guide
Logger Brute Force Attack Detection Security Use Case User's GuideLogger Brute Force Attack Detection Security Use Case User's Guide
Logger Brute Force Attack Detection Security Use Case User's Guideprotect724rkeer
 
User interface introduction openbravo
User interface introduction   openbravoUser interface introduction   openbravo
User interface introduction openbravoAbul Khayer
 
IRbase Tutorial
IRbase TutorialIRbase Tutorial
IRbase TutorialVectorBase
 
Managing and monitoring opportunities in Windows 7
Managing and monitoring opportunities in Windows 7Managing and monitoring opportunities in Windows 7
Managing and monitoring opportunities in Windows 7Sajith Ekanayaka
 
Report on forensics tools
Report on forensics toolsReport on forensics tools
Report on forensics toolsVishnuPratap7
 
Brevity NDIS Software - Quick Start Guide
Brevity NDIS Software - Quick Start GuideBrevity NDIS Software - Quick Start Guide
Brevity NDIS Software - Quick Start GuideBilal Mafawalla (MBA)
 
User's Guide
User's GuideUser's Guide
User's Guidebutest
 
Revo Uninstaller Pro Help
Revo Uninstaller Pro HelpRevo Uninstaller Pro Help
Revo Uninstaller Pro Helpguestd9ca37
 
Access 2003 tutorial 2
Access 2003 tutorial 2Access 2003 tutorial 2
Access 2003 tutorial 2catacata1976
 
Pks ms access unit 4_bcomcs
Pks ms access unit 4_bcomcsPks ms access unit 4_bcomcs
Pks ms access unit 4_bcomcsKALAISELVI P
 
Computing for Engineering - Lecture 03
Computing for Engineering - Lecture 03Computing for Engineering - Lecture 03
Computing for Engineering - Lecture 03Sarchia Khursheed
 

Similar to Web application attack and audit framework (w3af) (20)

3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado3 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado
 
Lesson 1 Basic Tutorial Data Analysis Software for Flow Cytometry
Lesson  1 Basic Tutorial Data Analysis Software for Flow CytometryLesson  1 Basic Tutorial Data Analysis Software for Flow Cytometry
Lesson 1 Basic Tutorial Data Analysis Software for Flow Cytometry
 
Logger Brute Force Attack Detection Security Use Case User's Guide
Logger Brute Force Attack Detection Security Use Case User's GuideLogger Brute Force Attack Detection Security Use Case User's Guide
Logger Brute Force Attack Detection Security Use Case User's Guide
 
Operating systems
Operating systemsOperating systems
Operating systems
 
ibuyer_Manual
ibuyer_Manualibuyer_Manual
ibuyer_Manual
 
User interface introduction openbravo
User interface introduction   openbravoUser interface introduction   openbravo
User interface introduction openbravo
 
IRbase Tutorial
IRbase TutorialIRbase Tutorial
IRbase Tutorial
 
(Manual spss)
(Manual spss)(Manual spss)
(Manual spss)
 
Managing and monitoring opportunities in Windows 7
Managing and monitoring opportunities in Windows 7Managing and monitoring opportunities in Windows 7
Managing and monitoring opportunities in Windows 7
 
Report on forensics tools
Report on forensics toolsReport on forensics tools
Report on forensics tools
 
Brevity NDIS Software - Quick Start Guide
Brevity NDIS Software - Quick Start GuideBrevity NDIS Software - Quick Start Guide
Brevity NDIS Software - Quick Start Guide
 
Remedy Presentation
Remedy PresentationRemedy Presentation
Remedy Presentation
 
User's Guide
User's GuideUser's Guide
User's Guide
 
Revo Uninstaller Pro Help
Revo Uninstaller Pro HelpRevo Uninstaller Pro Help
Revo Uninstaller Pro Help
 
Search++ Manual
Search++ ManualSearch++ Manual
Search++ Manual
 
Access 2003 tutorial 2
Access 2003 tutorial 2Access 2003 tutorial 2
Access 2003 tutorial 2
 
Mule management console
Mule management consoleMule management console
Mule management console
 
3320 lab1
3320 lab13320 lab1
3320 lab1
 
Pks ms access unit 4_bcomcs
Pks ms access unit 4_bcomcsPks ms access unit 4_bcomcs
Pks ms access unit 4_bcomcs
 
Computing for Engineering - Lecture 03
Computing for Engineering - Lecture 03Computing for Engineering - Lecture 03
Computing for Engineering - Lecture 03
 

More from Abhishek Choksi

Industrial Instrumentation (2170913) (Variable Inductance & Capacitance Tran...
Industrial Instrumentation (2170913)  (Variable Inductance & Capacitance Tran...Industrial Instrumentation (2170913)  (Variable Inductance & Capacitance Tran...
Industrial Instrumentation (2170913) (Variable Inductance & Capacitance Tran...Abhishek Choksi
 
Switch Gear & Protection (2170908) (Generator Protection)
Switch Gear & Protection (2170908) (Generator Protection)Switch Gear & Protection (2170908) (Generator Protection)
Switch Gear & Protection (2170908) (Generator Protection)Abhishek Choksi
 
Design of Magnetic Circuit for Synchronous Machine
Design of Magnetic Circuit for Synchronous MachineDesign of Magnetic Circuit for Synchronous Machine
Design of Magnetic Circuit for Synchronous MachineAbhishek Choksi
 
Inter Connected Power System (2170901)
Inter Connected Power System (2170901)Inter Connected Power System (2170901)
Inter Connected Power System (2170901)Abhishek Choksi
 
Closed loop speed control
Closed loop speed controlClosed loop speed control
Closed loop speed controlAbhishek Choksi
 
Synthesis of unsymmetrical phasors from their symmetrical components
Synthesis of unsymmetrical phasors from their symmetrical componentsSynthesis of unsymmetrical phasors from their symmetrical components
Synthesis of unsymmetrical phasors from their symmetrical componentsAbhishek Choksi
 
Measurement of hvac (High Voltage Engineering )
Measurement  of  hvac (High Voltage Engineering )Measurement  of  hvac (High Voltage Engineering )
Measurement of hvac (High Voltage Engineering )Abhishek Choksi
 
Supply system (Electrical Power System)
Supply system (Electrical Power System)Supply system (Electrical Power System)
Supply system (Electrical Power System)Abhishek Choksi
 
Design of dc armature winding
Design of dc armature windingDesign of dc armature winding
Design of dc armature windingAbhishek Choksi
 
8051 microcontroller and it’s interface
8051 microcontroller and it’s interface8051 microcontroller and it’s interface
8051 microcontroller and it’s interfaceAbhishek Choksi
 
Principle of regenerative braking and chopper configuration
Principle of regenerative braking and chopper configurationPrinciple of regenerative braking and chopper configuration
Principle of regenerative braking and chopper configurationAbhishek Choksi
 
Discrete Fourier Transform
Discrete Fourier TransformDiscrete Fourier Transform
Discrete Fourier TransformAbhishek Choksi
 
Solar Energy presentation
Solar Energy presentationSolar Energy presentation
Solar Energy presentationAbhishek Choksi
 

More from Abhishek Choksi (20)

Industrial Instrumentation (2170913) (Variable Inductance & Capacitance Tran...
Industrial Instrumentation (2170913)  (Variable Inductance & Capacitance Tran...Industrial Instrumentation (2170913)  (Variable Inductance & Capacitance Tran...
Industrial Instrumentation (2170913) (Variable Inductance & Capacitance Tran...
 
Switch Gear & Protection (2170908) (Generator Protection)
Switch Gear & Protection (2170908) (Generator Protection)Switch Gear & Protection (2170908) (Generator Protection)
Switch Gear & Protection (2170908) (Generator Protection)
 
Design of Magnetic Circuit for Synchronous Machine
Design of Magnetic Circuit for Synchronous MachineDesign of Magnetic Circuit for Synchronous Machine
Design of Magnetic Circuit for Synchronous Machine
 
Inter Connected Power System (2170901)
Inter Connected Power System (2170901)Inter Connected Power System (2170901)
Inter Connected Power System (2170901)
 
Third harmonic pwm
Third harmonic pwmThird harmonic pwm
Third harmonic pwm
 
Electric welding
Electric weldingElectric welding
Electric welding
 
Closed loop speed control
Closed loop speed controlClosed loop speed control
Closed loop speed control
 
Synthesis of unsymmetrical phasors from their symmetrical components
Synthesis of unsymmetrical phasors from their symmetrical componentsSynthesis of unsymmetrical phasors from their symmetrical components
Synthesis of unsymmetrical phasors from their symmetrical components
 
Design of lv winding
Design  of  lv  windingDesign  of  lv  winding
Design of lv winding
 
Measurement of hvac (High Voltage Engineering )
Measurement  of  hvac (High Voltage Engineering )Measurement  of  hvac (High Voltage Engineering )
Measurement of hvac (High Voltage Engineering )
 
Supply system (Electrical Power System)
Supply system (Electrical Power System)Supply system (Electrical Power System)
Supply system (Electrical Power System)
 
Design of dc armature winding
Design of dc armature windingDesign of dc armature winding
Design of dc armature winding
 
8051 microcontroller and it’s interface
8051 microcontroller and it’s interface8051 microcontroller and it’s interface
8051 microcontroller and it’s interface
 
Principle of regenerative braking and chopper configuration
Principle of regenerative braking and chopper configurationPrinciple of regenerative braking and chopper configuration
Principle of regenerative braking and chopper configuration
 
Root locus
Root locus Root locus
Root locus
 
Discrete Fourier Transform
Discrete Fourier TransformDiscrete Fourier Transform
Discrete Fourier Transform
 
K - Map
  K - Map    K - Map
K - Map
 
Blue led
Blue ledBlue led
Blue led
 
Mars orbiter mission
Mars orbiter missionMars orbiter mission
Mars orbiter mission
 
Solar Energy presentation
Solar Energy presentationSolar Energy presentation
Solar Energy presentation
 

Recently uploaded

457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...vershagrag
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 

Recently uploaded (20)

457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

Web application attack and audit framework (w3af)

  • 1. ACTIVE LEARNING ASSIGNMENT SUBJECT : Cyber Security (2150002) TOPIC : Web application attack and audit framework (w3af) Branch : Electrical Engineering Prepared By :- Kaveesh Raval (140120109016) Harsh Dedakia (140120109012) Abhishek Choksi (140120109005) Himal Desai (140120109008) Guided By:- Prof. Abhishek Harit Gandhinagar Institute of Technology
  • 2. w3af (web application attack and audit framework) is an open- source web application security scanner. The project provides a vulnerability scanner and exploitation tool for Web applications. It provides information about security vulnerabilities and aids in penetration testing efforts. Users have the choice between a graphic user interface and a command-line interface. w3af identifies most web application vulnerabilities using more than 130 plug-ins. After identification, vulnerabilities like (blind) SQL injections, OS commanding, remote file inclusions (PHP), cross-site scripting (XSS), and unsafe file uploads, can be exploited in order to gain different types of access to the remote system.
  • 3.
  • 4. 1.Menu bar 2.Toolbar 3.Notebook Tabs 4.Toolbar 5.Found elements  In the notebook tab at the program beginning, there are three vertical panels: 6. The profiles 7. The Plugin Selector 8. The Plugin Configuration Area 9. Target URL 
  • 5. To scan the web sites in different ways there are different plugins that can be configured in different ways. The first section has all the scan plugins, in the upper part of the column [1]. There you have the different plugins grouped regarding the scan type. They are separated in: •Audit •Brute force •Crawl •Infrastructure •Evasion •Grep •Mangle •Output
  • 6. If you select on any plugin you will see in the right panel [3] some information of that plugin. To configure the plugin, just select it, and modify the options that appears on in the right panel [3]. Note that you need to Save the configuration to use it. If you make right-click over a plugin (or select Edit Plugin in the Edit menu), a text editor will open and you’ll be able to actually edit the plugin source code.
  • 7. In the profiles you can save different configurations. You can think a Profile as a collection of configured plugins and target URL.
  • 8. To actually run the scan some conditions need to be met: at least one plugin needs to be activated, and a target URL must be set. You’ll notice that everything is OK to go, because the Start button will be enabled. When the scanning process is started, the system will switch automatically to the Log tab. In this tab you can see how the scan evolves through the different indicators. This tab has two main sections. In the upper part you have the logging text, where you can see all the information generated by the system. In the principal section of that part [1] you can see all the messages generated by the system, from the first one to the last generated.  As this log is normally a large quantity of text, you can enable and disable the different type of messages, using the checkboxes in the log bar [4].
  • 9.
  • 10. All this information is updated in real time. For a better visual following of the process, you also have, at the right of the toolbar, three indicators showing the quantity of information items found, of vulnerabilities found, and the shell which were successfully exploited
  • 11. You can explore and analyze the scanning results after the scan process is completed (or before it’s finished, because the system let’s you work concurrently with that process).  There’s a complete tab for results in w3af, and as there’re a lot of information to analyze, this tab is also divided in tabs, as you can check the Knowledge Base, see the site structure, or navigate through the individual requests and responses.
  • 12.
  • 13. The Knowledge Base is a collection of discovered items, that can be classified in Vulnerabilities, Information, and other stuff. The KB Browser tab lets you dive into this information. In the left part of the window [1] you’ll find the information of the Knowledge Base. By default it only shows you the vulnerabilities and information, but you can enable also the miscellaneous stuff or hide any of them, using the checkboxes above the info [2]. The information is grouped in a tree way, but you have different nodes to expand. If you select one of the items, and that item corresponds to a HTTP request originated by the scanning, you will see in the right part of the window all the information about that request and its response (more info about this below).
  • 14. The items in the tree has a color that indicates the severity of the issue: black for information, orange for low-severity vulnerabilities, and red for medium or high severity ones. Above everything [3] you have general information about when the request was found (actually, this is the same line that you can find in the logs regarding this request). Below that info you have the request headers [4], the request body [5], the response headers [6], and the response body [7].
  • 15. The URLs tab shows the structure of the site that the system worked on. It’s separated In two parts, but both parts show actually the same information, although they show it in different ways.
  • 16. In this window you will be able to search for any request (and the associated response) that the system had generated during the scanning. In the upper text entry [1] you can insert a query to search the knowledge database for requests and responses.  After you enter the query, and hit the Find button, the system will retrieve all the requests and responses that match, and will present them to you in the results list [2]. If you click on any of those results, you’ll see the request and response details [3].
  • 17.
  • 18.
  • 19. This window is separated in different panels. At the very left [1] you have a list of all the exploits that you can execute over the vulnerabilities that you found, which are listed in the second column [2]. You can see there that we found three vulnerabilities, as you can also check in the left bottom corner of the window [3]. At the right part of the window, there’re two panels: one [4] for the exploited shells. Finally, you can see that when you enter to this tab, the Multiple Exploit button in the toolbar [6] is enabled.
  • 20. Exploits act on vulnerabilities. But not all exploits act on every vulnerabilities. To exploit a vulnerability, you need to drag the exploit and drop it on the vulnerability you want to exploit. This drag & drop process is all you need to activate one specific exploit.
  • 21. If you want to trigger more than one exploit at once, you should click on the Multiple Exploit button in the toolbar, and a window will appear. There you can select all the exploits that you want to trigger, and when you click on the Execute button, the system will try all the marked exploits on all the possible vulnerabilities. If you activate the First successful checkbox, the system will stop after the first time that an exploit succeeds when working on any vulnerability.