<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mlantz</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mlantz"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Mlantz"/>
		<updated>2026-04-26T00:26:07Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188044</id>
		<title>Automated Audit using WAPITI</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188044"/>
				<updated>2015-01-14T04:25:57Z</updated>
		
		<summary type="html">&lt;p&gt;Mlantz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
WAPITI is a simple command line to tool to automate the audit of a web application. It's free and open source and has had some recent edits and updates ([http://wapiti.sourceforge.net/ WAPITI homepage]). The application is available for contribution at ([http://sourceforge.net/projects/wapiti/ WAPITI Repository]). &lt;br /&gt;
&lt;br /&gt;
Please be aware this command line does not replace a manual audit but can be useful to perform a first validation or exploration of legacy projects.&lt;br /&gt;
&lt;br /&gt;
== Requirements ==&lt;br /&gt;
&lt;br /&gt;
Python 2.6+&lt;br /&gt;
&lt;br /&gt;
It is also recommended that you perform a build of the app:&lt;br /&gt;
&lt;br /&gt;
python setup.py install&lt;br /&gt;
&lt;br /&gt;
== Command ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;python wapiti http://mysite.com -n 10 -b folder -u -v 1 -f html -o /tmp/scan_report&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Options used:'''&lt;br /&gt;
* -n: Define a limit of urls to read with the same pattern (prevent endless loops), here limit to 10.&lt;br /&gt;
* -b: Set the scope of the scan, here we analyze all the links to the pages which are in the same domain as the URL passed.&lt;br /&gt;
* -u: Use color to highlight vulnerables parameters in output.&lt;br /&gt;
* -v: Define verbosity level, here we print each url.&lt;br /&gt;
* -f: Define report type, here we choose HTML format.&lt;br /&gt;
* -o: Define report destination, in our case it must be a directory because we choose HTML format.&lt;br /&gt;
&lt;br /&gt;
'''Attack modules used by WAPITI:'''&lt;br /&gt;
* ''backup'': This module search backup of scripts on the server.&lt;br /&gt;
* ''blindsql'': Time-based blind sql scanner.&lt;br /&gt;
* ''crlf'': Search for CR/LF injection in HTTP headers.&lt;br /&gt;
* ''exec'': Module used to detect command execution vulnerabilities.&lt;br /&gt;
* ''file'': Search for include()/fread() and other file handling vulns.&lt;br /&gt;
* ''htaccess'': Try to bypass weak htaccess configurations.&lt;br /&gt;
* ''nikto'': Use a Nikto database to search for potentially dangerous files.&lt;br /&gt;
* ''permanentxss'': Look for permanent XSS.&lt;br /&gt;
* ''sql'': Standard error-based SQL injection scanner.&lt;br /&gt;
* ''xss'': Module for XSS detection.&lt;br /&gt;
* ''buster'': Module for a file and directory buster attack - checking for &amp;quot;bad&amp;quot; files.&lt;br /&gt;
* ''shellshock'': Module for Shellshock bug detection.&lt;br /&gt;
&lt;br /&gt;
== Report ==&lt;br /&gt;
&lt;br /&gt;
A sample TXT report is available [http://wapiti.sourceforge.net/example.txt here].&lt;br /&gt;
&lt;br /&gt;
[[Category:Code Snippet]]&lt;br /&gt;
[[Category:Automated Audit]]&lt;br /&gt;
[[Category:Externally Linked Page]]&lt;br /&gt;
[[Category:Python]]&lt;/div&gt;</summary>
		<author><name>Mlantz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188043</id>
		<title>Automated Audit using WAPITI</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188043"/>
				<updated>2015-01-14T04:23:58Z</updated>
		
		<summary type="html">&lt;p&gt;Mlantz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Description ==&lt;br /&gt;
&lt;br /&gt;
WAPITI is a simple command line to tool to automate the audit of a web application. It's free and open source and has had some recent edits and updates ([http://wapiti.sourceforge.net/ WAPITI homepage]). The application is available for contribution at ([http://sourceforge.net/projects/wapiti/ WAPITI Repository]). &lt;br /&gt;
&lt;br /&gt;
Please be aware this command line does not replace a manual audit but can be useful to perform a first validation or exploration of legacy projects.&lt;br /&gt;
&lt;br /&gt;
== Command line ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;python wapiti http://mysite.com -n 10 -b folder -u -v 1 -f html -o /tmp/scan_report&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Options used:'''&lt;br /&gt;
* -n: Define a limit of urls to read with the same pattern (prevent endless loops), here limit to 10.&lt;br /&gt;
* -b: Set the scope of the scan, here we analyze all the links to the pages which are in the same domain as the URL passed.&lt;br /&gt;
* -u: Use color to highlight vulnerables parameters in output.&lt;br /&gt;
* -v: Define verbosity level, here we print each url.&lt;br /&gt;
* -f: Define report type, here we choose HTML format.&lt;br /&gt;
* -o: Define report destination, in our case it must be a directory because we choose HTML format.&lt;br /&gt;
&lt;br /&gt;
'''Attack modules used by WAPITI:'''&lt;br /&gt;
* ''backup'': This module search backup of scripts on the server.&lt;br /&gt;
* ''blindsql'': Time-based blind sql scanner.&lt;br /&gt;
* ''crlf'': Search for CR/LF injection in HTTP headers.&lt;br /&gt;
* ''exec'': Module used to detect command execution vulnerabilities.&lt;br /&gt;
* ''file'': Search for include()/fread() and other file handling vulns.&lt;br /&gt;
* ''htaccess'': Try to bypass weak htaccess configurations.&lt;br /&gt;
* ''nikto'': Use a Nikto database to search for potentially dangerous files.&lt;br /&gt;
* ''permanentxss'': Look for permanent XSS.&lt;br /&gt;
* ''sql'': Standard error-based SQL injection scanner.&lt;br /&gt;
* ''xss'': Module for XSS detection.&lt;br /&gt;
* ''buster'': Module for a file and directory buster attack - checking for &amp;quot;bad&amp;quot; files.&lt;br /&gt;
* ''shellshock'': Module for Shellshock bug detection.&lt;br /&gt;
&lt;br /&gt;
== Report ==&lt;br /&gt;
&lt;br /&gt;
A sample TXT report is available [http://wapiti.sourceforge.net/example.txt here].&lt;br /&gt;
&lt;br /&gt;
[[Category:Code Snippet]]&lt;br /&gt;
[[Category:Automated Audit]]&lt;br /&gt;
[[Category:Externally Linked Page]]&lt;br /&gt;
[[Category:Python]]&lt;/div&gt;</summary>
		<author><name>Mlantz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188042</id>
		<title>Automated Audit using WAPITI</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188042"/>
				<updated>2015-01-14T04:22:40Z</updated>
		
		<summary type="html">&lt;p&gt;Mlantz: /* Report */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last revision (mm/dd/yy): '''01/13/2015'''&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color:#088A08&amp;quot;&amp;gt;This type of article aims to provide to development teams an easy/quick way &lt;br /&gt;
to perform automated audit tests against their web application projects.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
WAPITI is a simple command line to tool to automate the audit of a web application. It's free and open source and has had some recent edits and updates ([http://wapiti.sourceforge.net/ WAPITI homepage]). The application is available for contribution at ([http://sourceforge.net/projects/wapiti/ WAPITI Repository]). &lt;br /&gt;
&lt;br /&gt;
Please be aware this command line does not replace a manual audit but can be useful to perform a first validation or exploration of legacy projects.&lt;br /&gt;
&lt;br /&gt;
== Command line ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;python wapiti http://mysite.com -n 10 -b folder -u -v 1 -f html -o /tmp/scan_report&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Options used:'''&lt;br /&gt;
* -n: Define a limit of urls to read with the same pattern (prevent endless loops), here limit to 10.&lt;br /&gt;
* -b: Set the scope of the scan, here we analyze all the links to the pages which are in the same domain as the URL passed.&lt;br /&gt;
* -u: Use color to highlight vulnerables parameters in output.&lt;br /&gt;
* -v: Define verbosity level, here we print each url.&lt;br /&gt;
* -f: Define report type, here we choose HTML format.&lt;br /&gt;
* -o: Define report destination, in our case it must be a directory because we choose HTML format.&lt;br /&gt;
&lt;br /&gt;
'''Attack modules used by WAPITI:'''&lt;br /&gt;
* ''backup'': This module search backup of scripts on the server.&lt;br /&gt;
* ''blindsql'': Time-based blind sql scanner.&lt;br /&gt;
* ''crlf'': Search for CR/LF injection in HTTP headers.&lt;br /&gt;
* ''exec'': Module used to detect command execution vulnerabilities.&lt;br /&gt;
* ''file'': Search for include()/fread() and other file handling vulns.&lt;br /&gt;
* ''htaccess'': Try to bypass weak htaccess configurations.&lt;br /&gt;
* ''nikto'': Use a Nikto database to search for potentially dangerous files.&lt;br /&gt;
* ''permanentxss'': Look for permanent XSS.&lt;br /&gt;
* ''sql'': Standard error-based SQL injection scanner.&lt;br /&gt;
* ''xss'': Module for XSS detection.&lt;br /&gt;
* ''buster'': Module for a file and directory buster attack - checking for &amp;quot;bad&amp;quot; files.&lt;br /&gt;
* ''shellshock'': Module for Shellshock bug detection.&lt;br /&gt;
&lt;br /&gt;
== Report ==&lt;br /&gt;
&lt;br /&gt;
A sample TXT report is available [http://wapiti.sourceforge.net/example.txt here].&lt;br /&gt;
&lt;br /&gt;
[[Category:Code Snippet]]&lt;br /&gt;
[[Category:Automated Audit]]&lt;br /&gt;
[[Category:Externally Linked Page]]&lt;br /&gt;
[[Category:Python]]&lt;/div&gt;</summary>
		<author><name>Mlantz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188041</id>
		<title>Automated Audit using WAPITI</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188041"/>
				<updated>2015-01-14T04:21:56Z</updated>
		
		<summary type="html">&lt;p&gt;Mlantz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last revision (mm/dd/yy): '''01/13/2015'''&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color:#088A08&amp;quot;&amp;gt;This type of article aims to provide to development teams an easy/quick way &lt;br /&gt;
to perform automated audit tests against their web application projects.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
WAPITI is a simple command line to tool to automate the audit of a web application. It's free and open source and has had some recent edits and updates ([http://wapiti.sourceforge.net/ WAPITI homepage]). The application is available for contribution at ([http://sourceforge.net/projects/wapiti/ WAPITI Repository]). &lt;br /&gt;
&lt;br /&gt;
Please be aware this command line does not replace a manual audit but can be useful to perform a first validation or exploration of legacy projects.&lt;br /&gt;
&lt;br /&gt;
== Command line ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;python wapiti http://mysite.com -n 10 -b folder -u -v 1 -f html -o /tmp/scan_report&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Options used:'''&lt;br /&gt;
* -n: Define a limit of urls to read with the same pattern (prevent endless loops), here limit to 10.&lt;br /&gt;
* -b: Set the scope of the scan, here we analyze all the links to the pages which are in the same domain as the URL passed.&lt;br /&gt;
* -u: Use color to highlight vulnerables parameters in output.&lt;br /&gt;
* -v: Define verbosity level, here we print each url.&lt;br /&gt;
* -f: Define report type, here we choose HTML format.&lt;br /&gt;
* -o: Define report destination, in our case it must be a directory because we choose HTML format.&lt;br /&gt;
&lt;br /&gt;
'''Attack modules used by WAPITI:'''&lt;br /&gt;
* ''backup'': This module search backup of scripts on the server.&lt;br /&gt;
* ''blindsql'': Time-based blind sql scanner.&lt;br /&gt;
* ''crlf'': Search for CR/LF injection in HTTP headers.&lt;br /&gt;
* ''exec'': Module used to detect command execution vulnerabilities.&lt;br /&gt;
* ''file'': Search for include()/fread() and other file handling vulns.&lt;br /&gt;
* ''htaccess'': Try to bypass weak htaccess configurations.&lt;br /&gt;
* ''nikto'': Use a Nikto database to search for potentially dangerous files.&lt;br /&gt;
* ''permanentxss'': Look for permanent XSS.&lt;br /&gt;
* ''sql'': Standard error-based SQL injection scanner.&lt;br /&gt;
* ''xss'': Module for XSS detection.&lt;br /&gt;
* ''buster'': Module for a file and directory buster attack - checking for &amp;quot;bad&amp;quot; files.&lt;br /&gt;
* ''shellshock'': Module for Shellshock bug detection.&lt;br /&gt;
&lt;br /&gt;
== Report ==&lt;br /&gt;
&lt;br /&gt;
A sample HTML report is available [http://www.ict-romulus.eu/web/wapiti/wiki/-/wiki/Main/Wapiti%20HTML%20Report here].&lt;br /&gt;
&lt;br /&gt;
[[Category:Code Snippet]]&lt;br /&gt;
[[Category:Automated Audit]]&lt;br /&gt;
[[Category:Externally Linked Page]]&lt;br /&gt;
[[Category:Python]]&lt;/div&gt;</summary>
		<author><name>Mlantz</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188040</id>
		<title>Automated Audit using WAPITI</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Automated_Audit_using_WAPITI&amp;diff=188040"/>
				<updated>2015-01-14T04:21:27Z</updated>
		
		<summary type="html">&lt;p&gt;Mlantz: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Last revision (mm/dd/yy): '''01/13/2015'''&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color:#088A08&amp;quot;&amp;gt;This type of article aims to provide to development teams an easy/quick way &lt;br /&gt;
to perform automated audit tests against their web application projects over implementation phase.&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
&lt;br /&gt;
WAPITI is a simple command line to tool to automate the audit of a web application. It's free and open source and has had some recent edits and updates ([http://wapiti.sourceforge.net/ WAPITI homepage]). The application is available for contribution at ([http://sourceforge.net/projects/wapiti/ WAPITI Repository]). &lt;br /&gt;
&lt;br /&gt;
Please be aware this command line does not replace a manual audit but can be useful to perform a first validation or exploration of legacy projects.&lt;br /&gt;
&lt;br /&gt;
== Command line ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;python wapiti http://mysite.com -n 10 -b folder -u -v 1 -f html -o /tmp/scan_report&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Options used:'''&lt;br /&gt;
* -n: Define a limit of urls to read with the same pattern (prevent endless loops), here limit to 10.&lt;br /&gt;
* -b: Set the scope of the scan, here we analyze all the links to the pages which are in the same domain as the URL passed.&lt;br /&gt;
* -u: Use color to highlight vulnerables parameters in output.&lt;br /&gt;
* -v: Define verbosity level, here we print each url.&lt;br /&gt;
* -f: Define report type, here we choose HTML format.&lt;br /&gt;
* -o: Define report destination, in our case it must be a directory because we choose HTML format.&lt;br /&gt;
&lt;br /&gt;
'''Attack modules used by WAPITI:'''&lt;br /&gt;
* ''backup'': This module search backup of scripts on the server.&lt;br /&gt;
* ''blindsql'': Time-based blind sql scanner.&lt;br /&gt;
* ''crlf'': Search for CR/LF injection in HTTP headers.&lt;br /&gt;
* ''exec'': Module used to detect command execution vulnerabilities.&lt;br /&gt;
* ''file'': Search for include()/fread() and other file handling vulns.&lt;br /&gt;
* ''htaccess'': Try to bypass weak htaccess configurations.&lt;br /&gt;
* ''nikto'': Use a Nikto database to search for potentially dangerous files.&lt;br /&gt;
* ''permanentxss'': Look for permanent XSS.&lt;br /&gt;
* ''sql'': Standard error-based SQL injection scanner.&lt;br /&gt;
* ''xss'': Module for XSS detection.&lt;br /&gt;
* ''buster'': Module for a file and directory buster attack - checking for &amp;quot;bad&amp;quot; files.&lt;br /&gt;
* ''shellshock'': Module for Shellshock bug detection.&lt;br /&gt;
&lt;br /&gt;
== Report ==&lt;br /&gt;
&lt;br /&gt;
A sample HTML report is available [http://www.ict-romulus.eu/web/wapiti/wiki/-/wiki/Main/Wapiti%20HTML%20Report here].&lt;br /&gt;
&lt;br /&gt;
[[Category:Code Snippet]]&lt;br /&gt;
[[Category:Automated Audit]]&lt;br /&gt;
[[Category:Externally Linked Page]]&lt;br /&gt;
[[Category:Python]]&lt;/div&gt;</summary>
		<author><name>Mlantz</name></author>	</entry>

	</feed>