<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Kali_Linux%3A_w3af_%28en%29</id>
	<title>Kali Linux: w3af (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Kali_Linux%3A_w3af_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Kali_Linux:_w3af_(en)&amp;action=history"/>
	<updated>2026-04-25T16:09:47Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Kali_Linux:_w3af_(en)&amp;diff=71375&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;W3AF is a feature-rich web attack application and audit framework aimed at detecting and exploiting web vulnerabilities. The entire application security assessment process is...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Kali_Linux:_w3af_(en)&amp;diff=71375&amp;oldid=prev"/>
		<updated>2025-01-03T22:57:26Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;W3AF is a feature-rich web attack application and audit framework aimed at detecting and exploiting web vulnerabilities. The entire application security assessment process is...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;W3AF is a feature-rich web attack application and audit framework aimed at detecting and exploiting web vulnerabilities. The entire application security assessment process is automated, and the framework is designed to follow three main steps: discovery, audit, and attack. Each of these steps includes several plugins that can help auditors focus on specific testing criteria. All of these plugins can communicate and share test data to achieve the desired goal. It supports detection and exploitation of several web application vulnerabilities including SQL injection, cross-site scripting, remote and local file inclusion, buffer overflows, XPath injection, OS command, application misconfiguration, and so on. For more information on each available plugin, visit: http://w3af.sourceforge.net/plugin-descriptions.php.&lt;br /&gt;
&lt;br /&gt;
W3AF installation can use the command,&lt;br /&gt;
&lt;br /&gt;
 cd ~&lt;br /&gt;
 apt install libcrypto++-dev&lt;br /&gt;
 apt-get update&lt;br /&gt;
 apt-get install -y python-pip w3af&lt;br /&gt;
 pip install --upgrade pip&lt;br /&gt;
 git clone https://github.com/andresriancho/w3af.git&lt;br /&gt;
 cd w3af&lt;br /&gt;
 ./w3af_console&lt;br /&gt;
 ./tmp/w3af_dependency_install.sh&lt;br /&gt;
&lt;br /&gt;
Once installed, to run W3AF, go to&lt;br /&gt;
&lt;br /&gt;
 Kali Linux &amp;gt; Web Applications &amp;gt; Web Vulnerability Scanners &amp;gt; w3af (Console)&lt;br /&gt;
&lt;br /&gt;
or use the console to run the following command:&lt;br /&gt;
&lt;br /&gt;
 w3af_console&lt;br /&gt;
&lt;br /&gt;
This will put you in the personalized W3AF console mode (w3af &amp;gt;&amp;gt;&amp;gt;). Note that a GUI version of this tool is also available at the same menu location, but we prefer to introduce you to the console version for its flexibility and ease of customization.&lt;br /&gt;
&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
&lt;br /&gt;
This will display all the basic options that can be used to configure the tests. You can use the help command whenever you need assistance to understand specific options. In this exercise, first configure the output plugin, activate selected audit tests, set the target, and run the scanning process against the target site using the following commands:&lt;br /&gt;
&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt; plugins&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; output&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; output console, htmlFile&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; output config htmlFile&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; view&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; set verbose True&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; set fileName testreport.html&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; back&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; output config console&lt;br /&gt;
 w3af/plugins/output/config:console&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
 w3af/plugins/output/config:console&amp;gt;&amp;gt;&amp;gt; view&lt;br /&gt;
 w3af/plugins/output/config:console&amp;gt;&amp;gt;&amp;gt; set verbose False&lt;br /&gt;
 w3af/plugins/output/config:console&amp;gt;&amp;gt;&amp;gt; back&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; audit&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; audit htaccessMethods, osCommanding, sqli, xss&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; back&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt; target&lt;br /&gt;
 w3af/config:target&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
 w3af/config:target&amp;gt;&amp;gt;&amp;gt; view&lt;br /&gt;
 w3af/config:target&amp;gt;&amp;gt;&amp;gt; set target http://testphp.example.com/&lt;br /&gt;
 w3af/config:target&amp;gt;&amp;gt;&amp;gt; back&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
At this point, we have configured all necessary test parameters. Our target will be evaluated against SQL injection, cross-site scripting, OS commanding, and htaccess configuration errors using the following code:&lt;br /&gt;
&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt; start&lt;br /&gt;
 Auto-enabling plugin: grep.error500&lt;br /&gt;
 Auto-enabling plugin: grep.httpAuthDetect&lt;br /&gt;
 Found 2 URLs and 2 different points of injection.&lt;br /&gt;
 The list of URLs is:&lt;br /&gt;
 - http://testphp.example.com/&lt;br /&gt;
 - http://testphp.example.com/search.php?test=query&lt;br /&gt;
 The list of fuzzable requests is:&lt;br /&gt;
 [227] Vulnerability Mapping&lt;br /&gt;
 - http://testphp.example.com/ | Method: GET&lt;br /&gt;
 - http://testphp.example.com/search.php?test=query | Method: POST |&lt;br /&gt;
 Parameters: (searchFor=&amp;quot;&amp;quot;)&lt;br /&gt;
 Starting sqli plugin execution.&lt;br /&gt;
 Starting osCommanding plugin execution.&lt;br /&gt;
 A possible OS Commanding was found at:&lt;br /&gt;
 &amp;quot;http://testphp.example.com/search.php?test=query&amp;quot;, using&lt;br /&gt;
 HTTP method POST. The sent post-data was:&lt;br /&gt;
 &amp;quot;searchFor=run+ping+-n+3+localhost&amp;amp;goButton=go&amp;quot;. Please review manually.&lt;br /&gt;
 This information was found in the request with id 22.&lt;br /&gt;
 Starting xss plugin execution.&lt;br /&gt;
 Cross Site Scripting was found at:&lt;br /&gt;
 &amp;quot;http://testphp.example.com/search.php?test=query&amp;quot;,&lt;br /&gt;
 using HTTP method POST. The sent post-data was:&lt;br /&gt;
 &amp;quot;searchFor=&amp;lt;ScRIPt/SrC=http://x4Xp/x.js&amp;gt;&amp;lt;/ScRIPt&amp;gt;&amp;amp;goButton=go&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
 This vulnerability affects Internet Explorer 6, Internet Explorer 7, Netscape with IE &lt;br /&gt;
 rendering engine, Mozilla Firefox, Netscape with Gecko rendering engine. This vulnerability &lt;br /&gt;
 was found in the request with id 39. Starting htaccessMethods plugin execution. Finished &lt;br /&gt;
 scanning process.&lt;br /&gt;
&lt;br /&gt;
As you can see, we have discovered several serious security vulnerabilities in the target web application. According to our configuration, the default location for the testing report (HTML) is /usr/share/web/w3af/testreport.html, detailing all vulnerabilities including debug information about each data request and response transferred between W3AF and the target web application. The test case we presented in the previous code does not reflect the use of other useful plugins, profiles, and exploitation options. Therefore, we highly recommend that you practice through various exercises available in the user guide, which can be found at&lt;br /&gt;
&lt;br /&gt;
 http://w3af.org/howtos/understanding-the-basics&lt;br /&gt;
 http://docs.w3af.org/en/latest/&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>