<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=VULNERABILITY%3A_w3af_%28en%29</id>
	<title>VULNERABILITY: w3af (en) - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=VULNERABILITY%3A_w3af_%28en%29"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=VULNERABILITY:_w3af_(en)&amp;action=history"/>
	<updated>2026-04-21T04:40:19Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=VULNERABILITY:_w3af_(en)&amp;diff=71778&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;W3AF is a feature-rich web attack application and audit framework that aims to detect and exploit web vulnerabilities. The entire application security assessment process is au...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=VULNERABILITY:_w3af_(en)&amp;diff=71778&amp;oldid=prev"/>
		<updated>2025-01-06T08:41:22Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;W3AF is a feature-rich web attack application and audit framework that aims to detect and exploit web vulnerabilities. The entire application security assessment process is au...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;W3AF is a feature-rich web attack application and audit framework that aims to detect and exploit web vulnerabilities. The entire application security assessment process is automated, and the framework is designed to follow three main steps: discovery, audit, and attack. Each of these steps includes multiple plugins, which can help auditors focus on specific testing criteria. All these plugins can communicate and share test data to achieve the desired objectives. It supports the detection and exploitation of several web application vulnerabilities including SQL injection, cross-site scripting, remote and local file inclusion, buffer overflows, XPath injection, OS command injection, application misconfigurations, and so forth. For more information about each available plugin, visit: http://w3af.sourceforge.net/plugin-descriptions.php.&lt;br /&gt;
&lt;br /&gt;
The installation of w3af can be done using the command,&lt;br /&gt;
&lt;br /&gt;
 cd ~&lt;br /&gt;
 apt install libcrypto++-dev&lt;br /&gt;
 apt-get update&lt;br /&gt;
 apt-get install -y python-pip w3af&lt;br /&gt;
 pip install --upgrade pip&lt;br /&gt;
 git clone https://github.com/andresriancho/w3af.git&lt;br /&gt;
 cd w3af&lt;br /&gt;
 ./w3af_console&lt;br /&gt;
 . /tmp/w3af_dependency_install.sh&lt;br /&gt;
&lt;br /&gt;
Once installed, to run W3AF, navigate to&lt;br /&gt;
&lt;br /&gt;
Kali Linux &amp;gt; Web Applications &amp;gt; Web Vulnerability Scanners &amp;gt; w3af (Console)&lt;br /&gt;
&lt;br /&gt;
or use the console to run the following command:&lt;br /&gt;
&lt;br /&gt;
 w3af_console&lt;br /&gt;
&lt;br /&gt;
This will place you in the personalized W3AF console mode (w3af &amp;gt;&amp;gt;&amp;gt;). Note that the GUI version of this tool is also available at the same menu location, but we prefer to introduce the console version to you due to its flexibility and ease of customization.&lt;br /&gt;
&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
&lt;br /&gt;
This will display all basic options that can be used to configure the tests. You can use the help command whenever you need assistance to know specific options. In this exercise, first configure the output plugin, enable selected audit tests, set the target, and run the scanning process against the target site using the following commands:&lt;br /&gt;
&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt; plugins&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; output&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; output console, htmlFile&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; output config htmlFile&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; view&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; set verbose True&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; set fileName testreport.html&lt;br /&gt;
 w3af/plugins/output/config:htmlFile&amp;gt;&amp;gt;&amp;gt; back&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; output config console&lt;br /&gt;
 w3af/plugins/output/config:console&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
 w3af/plugins/output/config:console&amp;gt;&amp;gt;&amp;gt; view&lt;br /&gt;
 w3af/plugins/output/config:console&amp;gt;&amp;gt;&amp;gt; set verbose False&lt;br /&gt;
 w3af/plugins/output/config:console&amp;gt;&amp;gt;&amp;gt; back&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; audit&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; audit htaccessMethods, osCommanding, sqli, xss&lt;br /&gt;
 w3af/plugins&amp;gt;&amp;gt;&amp;gt; back&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt; target&lt;br /&gt;
 w3af/config:target&amp;gt;&amp;gt;&amp;gt; help&lt;br /&gt;
 w3af/config:target&amp;gt;&amp;gt;&amp;gt; view&lt;br /&gt;
 w3af/config:target&amp;gt;&amp;gt;&amp;gt; set target http://testphp.example.com/&lt;br /&gt;
 w3af/config:target&amp;gt;&amp;gt;&amp;gt; back&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
At this point, we have configured all the necessary test parameters. Our target will be evaluated against SQL injection, cross-site scripting, OS commanding, and htaccess configuration errors using the following code:&lt;br /&gt;
&lt;br /&gt;
 w3af&amp;gt;&amp;gt;&amp;gt; start&lt;br /&gt;
 Auto-enabling plugin: grep.error500&lt;br /&gt;
 Auto-enabling plugin: grep.httpAuthDetect&lt;br /&gt;
 Found 2 URLs and 2 different points of injection.&lt;br /&gt;
 The list of URLs is:&lt;br /&gt;
 - http://testphp.example.com/&lt;br /&gt;
 - http://testphp.example.com/search.php?test=query&lt;br /&gt;
 The list of fuzzable requests is:&lt;br /&gt;
 [ 227 ]Vulnerability Mapping&lt;br /&gt;
 - http://testphp.example.com/ | Method: GET&lt;br /&gt;
 - http://testphp.example.com/search.php?test=query | Method: POST |&lt;br /&gt;
 Parameters: (searchFor=&amp;quot;&amp;quot;)&lt;br /&gt;
 Starting sqli plugin execution.&lt;br /&gt;
 Starting osCommanding plugin execution.&lt;br /&gt;
 A possible OS Commanding was found at:&lt;br /&gt;
 &amp;quot;http://testphp.example.com/search.php?test=query&amp;quot;, using&lt;br /&gt;
 HTTP method POST. The sent post-data was:&lt;br /&gt;
 &amp;quot;searchFor=run+ping+-n+3+localhost&amp;amp;goButton=go&amp;quot;.Please review manually.&lt;br /&gt;
 This information was found in the request with id 22.&lt;br /&gt;
 Starting xss plugin execution.&lt;br /&gt;
 Cross Site Scripting was found at:&lt;br /&gt;
 &amp;quot;http://testphp.example.com/search.php?test=query&amp;quot;,&lt;br /&gt;
 using HTTP method POST. The sent post-data was:&lt;br /&gt;
 &amp;quot;searchFor=&amp;lt;ScRIPt/SrC=http://x4Xp/x.js&amp;gt;&amp;lt;/ScRIPt&amp;gt;&amp;amp;goButton=go&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
 This vulnerability affects Internet Explorer 6, Internet Explorer 7, Netscape with IE rendering engine, Mozilla Firefox, Netscape with Gecko rendering engine. This vulnerability was found in the request with id 39. Starting htaccessMethods plugin execution. Finished scanning process.&lt;br /&gt;
&lt;br /&gt;
As you can see, we have found several serious security vulnerabilities in the target web application. As per our configuration, the default location for the testing report (HTML) is /usr/share/web/w3af/testreport.html, detailing all vulnerabilities including debug information about each data request and response transferred between W3AF and the target web application. The test case we provided in the previous code does not reflect the use of other useful plugins, profiles, and exploitation options. Therefore, we highly recommend that you practice through the various exercises available in the user guide, which is available at&lt;br /&gt;
&lt;br /&gt;
* http://w3af.org/howtos/understanding-the-basics&lt;br /&gt;
* http://docs.w3af.org/en/latest/&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>