Web Application Attack and Audit Framework By Prajwal Panchmahalkar
W3af is a well known  web attack and auditing framework . Very similar to Metasploit framework  W3af combines all necessary actions for a complete web attack. Mapping Discovery Exploitation This puts the framework into three major plug-ins.
Web Service Support  Exploits  SQL injections(blind) OS  commanding remote file inclusions local file inclusions XSS and more A good harmony among plug-ins.
Discovery Plugin URLS Injection Points  Audit Plugin Uses the above injection points Sends crafted data to find vulnerabilities Exploit Plugin Exploits vulnerabilities found Provides SQL dumps / remote shell is returned
 
 
Find all the URLs  Create Fuzzable request Plugins: WebSpider URL fuzzer Pykto  GoogleFuzzer
They  use the discovery plug-in outputs and find their respective vulnerabilities SQL Injection (blind) XSS Buffer Overflow Response Splitting
Grep every HTTP request and response findComments passwordProfiling privateIP DirectoryIndexing Getmails lang
BruteForce Bruteforce logins  Evasion Modify the request to evade IDS detection Mangle Modify requests/responses based on regular expressions. Output Write logs .
Prajwal Panchmahalkar Team :  Matriux  , n|u   [email_address]
THANKS TO ALL
 

W3AF|null

  • 1.
    Web Application Attackand Audit Framework By Prajwal Panchmahalkar
  • 2.
    W3af is awell known web attack and auditing framework . Very similar to Metasploit framework W3af combines all necessary actions for a complete web attack. Mapping Discovery Exploitation This puts the framework into three major plug-ins.
  • 3.
    Web Service Support Exploits SQL injections(blind) OS commanding remote file inclusions local file inclusions XSS and more A good harmony among plug-ins.
  • 4.
    Discovery Plugin URLSInjection Points Audit Plugin Uses the above injection points Sends crafted data to find vulnerabilities Exploit Plugin Exploits vulnerabilities found Provides SQL dumps / remote shell is returned
  • 5.
  • 6.
  • 7.
    Find all theURLs Create Fuzzable request Plugins: WebSpider URL fuzzer Pykto GoogleFuzzer
  • 8.
    They usethe discovery plug-in outputs and find their respective vulnerabilities SQL Injection (blind) XSS Buffer Overflow Response Splitting
  • 9.
    Grep every HTTPrequest and response findComments passwordProfiling privateIP DirectoryIndexing Getmails lang
  • 10.
    BruteForce Bruteforce logins Evasion Modify the request to evade IDS detection Mangle Modify requests/responses based on regular expressions. Output Write logs .
  • 11.
    Prajwal Panchmahalkar Team: Matriux , n|u [email_address]
  • 12.
  • 13.