w3af

13
Web Application Web Application Attack Attack and Audit Framework and Audit Framework By Prajwal Panchmahalkar

Upload: nu-the-open-security-community

Post on 09-Jun-2015

1.442 views

Category:

Technology


6 download

DESCRIPTION

w3af by Prajwal Panchmahalkar @ null Hyderabad Meet, August, 2010

TRANSCRIPT

Page 1: w3af

Web Application AttackWeb Application Attackand Audit Frameworkand Audit Framework

By Prajwal Panchmahalkar

Page 2: w3af

W3af is a well known web attack and auditing framework.

•Very similar to Metasploit framework

W3af combines all necessary actions for a complete web attack.

•Mapping•Discovery•Exploitation

This puts the framework into three major plug-ins.

Page 3: w3af

Web Service Support Exploits

•SQL injections(blind)

• OS commanding

• remote file inclusions

• local file inclusions

• XSS and more

A good harmony among plug-ins.

Page 4: w3af

Discovery PluginDiscovery Plugin•URLS•Injection Points

Audit PluginAudit Plugin•Uses the above injection points•Sends crafted data to find vulnerabilities

Exploit PluginExploit Plugin•Exploits vulnerabilities found•Provides SQL dumps / remote shell is returned

Page 5: w3af
Page 6: w3af
Page 7: w3af

Find all the URLs

•Create Fuzzable requestPlugins:

•WebSpider

•URL fuzzer

•Pykto

•GoogleFuzzer

Page 8: w3af

They use the discovery plug-in outputs and find their respective vulnerabilities

•SQL Injection (blind)

•XSS

•Buffer Overflow

•Response Splitting

Page 9: w3af

Grep every HTTP request and response

•findComments•passwordProfiling•privateIP•DirectoryIndexing•Getmails•lang

Page 10: w3af

BruteForce•Bruteforce logins

Evasion•Modify the request to evade IDS detection

Mangle•Modify requests/responses based on regular expressions.

Output•Write logs .

Page 11: w3af

Prajwal Panchmahalkar

Team : Matriux ,n|u

[email protected]

Page 12: w3af

THANKS TOTHANKS TO

ALLALL

Page 13: w3af