applications Provides information about security vulnerabilities to aid in penetration testing Includes both a graphical and command-line user interface Open-sourced
login where auto-scanners won't work (facebook/etc.) bruteforce crack login forms discovery find new URLs, servers, etc. evasion evade Intrusion Prevention System detection grep analyze source code for dates, credit cards etc... mangle modify requests made 'on the fly' output configure how results will be displayed plugin categories
file is used to command web crawlers to ignore certain paths or directories. Google and Bing spiders explicitly ignore these pages. w3af can sneak past this
ORDER BY 1;# page loads http://www.vulnerable.com/hax.php?page=1' ORDER BY 2;# http://www.vulnerable.com/hax.php?page=1' ORDER BY 3;# page loads page loads page loads
ORDER BY 1;# page loads http://www.vulnerable.com/hax.php?page=1' ORDER BY 2;# http://www.vulnerable.com/hax.php?page=1' ORDER BY 3;# http://www.vulnerable.com/hax.php?page=1' ORDER BY 4;# page loads page errors now, we know there are 3 columns page loads page loads
be dangerous if... • File types are not verified ◦ Should you be allowed to upload shell scripts? • Uploaded files are executable ◦ Should uploaded files be allowed to run on the server? • Files reside within a server's home directory ◦ Should uploaded files be accessible?
are sensitive? If files are saved directly on the web server, then w3af can easily find them using discovery plugins. w3af may even be able to give you a remote shell into the server if files are executable!
inside html comments <!--#directive parameter="value"--> directives => instruction. parameters => what to perform the instruction on <!--#include file="foo.shtml"-->