Unconfigured Ad Widget

Collapse

Anúncio

Collapse
No announcement yet.

Wapiti [Web application vulnerability scanner]

Collapse
X
 
  • Filter
  • Tempo
  • Show
Clear All
new posts

  • Font Size
    #1

    Scanner Wapiti [Web application vulnerability scanner]

    Um scanner de vulnerabilidades em sites muito eficiente e poderoso
    achando varios tipos de vulnerabilidades
    Web application vulnerability scanner

    Funções
    *File Handling Errors (Local and remote include/require, fopen, readfile...)
    * Database Injections (PHP/JSP/ASP SQL Injections and XPath Injections)
    * XSS (Cross Site Scripting) Injection
    * LDAP Injection
    * Command Execution detection (eval(), system(), passtru()...)
    * CRLF Injection (HTTP Response Splitting, session fixation...)
    Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...

    Como usar:



    Wapiti-2.2.1 - A web application vulnerability scanner

    Usage: python wapiti.py Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... [options]

    Supported options are:
    -s
    --start
    To specify an url to start with

    -x
    --exclude
    To exclude an url from the scan (for example logout scripts)
    You can also use a wildcard (*)
    Example : -x "http://server/base/?page=*&module=test"
    or -x Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar... to exclude a directory

    -p
    --proxy
    To specify a proxy
    Exemple: -p Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...

    -c
    --cookie
    To use a cookie

    -t
    --timeout
    To fix the timeout (in seconds)

    -a
    --auth
    Set credentials for HTTP authentication
    Doesn't work with Python 2.4

    -r
    --remove
    Remove a parameter from URLs

    -n
    --nice
    Define a limit of urls to read with the same pattern
    Use this option to prevent endless loops
    Must be greater than 0

    -m
    --module
    Set the modules and HTTP methods to use for attacks.
    Example: -m "-all,xss:get,execost"

    -u
    --underline
    Use color to highlight vulnerables parameters in output

    -v
    --verbose
    Set the verbosity level
    0: quiet (default), 1: print each url, 2: print every attack

    -f
    --reportType
    Set the type of the report
    xml: Report in XML format
    html: Report in HTML format

    -o
    --output
    Set the name of the report file
    If the selected report type is "html", this parameter must be a directory

    -i
    --continue
    This parameter indicates Wapiti to continue with the scan from the specified
    file, this file should contain data from a previous scan.
    The file is optional, if it is not specified, Wapiti takes the default file
    from \"scans\" folder.

    -k
    --attack
    This parameter indicates Wapiti to perform attacks without scanning again the
    website and following the data of this file.
    The file is optional, if it is not specified, Wapiti takes the default file
    from \"scans\" folder.

    -h
    --help
    To print this usage message




    Apenas usuários registrados e ativados podem ver os links., Clique aqui para se cadastrar...



    Creditos:
    DragoN
    -------------------------------------------------------------------------------------------







  • Font Size
    #2
    uia eu queria um scanner facil de usar que rodasse em ambiente irc..mais vlw pelo topico

    Comment


    • Font Size
      #3
      Nao percebo como usar o programa

      Comment

      X
      Working...
      X