This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP/Training/OWASP Webslayer Project"
From OWASP
Sandra Paiva (talk | contribs) |
Sandra Paiva (talk | contribs) |
||
(One intermediate revision by the same user not shown) | |||
Line 43: | Line 43: | ||
<br> | <br> | ||
*[http://www.vimeo.com/18082291 Video of the session presented at IBWAS'10 Training Day, 16th Dec 2010] | *[http://www.vimeo.com/18082291 Video of the session presented at IBWAS'10 Training Day, 16th Dec 2010] | ||
+ | *[http://www.owasp.org/index.php/File:Christian_Martorella-Webslayer-Training-IBWAS2010.pdf Webslayer Training, IBWAS2010] | ||
| | ||
}} | }} |
Latest revision as of 18:59, 12 January 2011
MODULE | |
' | |
Overview & Goal | |
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc.
The tools have a payload generator and a easy and powerful results analyzer.
Some features are:
| |
Contents | Materials |
The training will show how to use the tool and will cover the following topics:
|
The training is a hands on course, so it is recommended to bring your own laptop (it´s possible to follow the training without a computer)
The latest version of Webslayer can be downloaded from google code subversion here.
|