This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Projects/OWASP Bywaf Project"
m |
(New vision new way) |
||
Line 1: | Line 1: | ||
+ | =Main= | ||
+ | |||
+ | <div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div> | ||
+ | |||
+ | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
+ | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | ==ByWaf== | ||
+ | |||
+ | ByWaf is a command-line tool for streamlining web application firewall | ||
+ | auditing. It consists of a command-line interpreter and a set of | ||
+ | plugins. | ||
+ | |||
+ | ==Introduction== | ||
+ | |||
+ | Develop an application that streamlines the auditor's job when making a Pen Test. | ||
+ | It's main fuction is to detect, evade and display vulnerabilities. | ||
+ | The tool works using coding methods developed by our teammembers throughout their experience. | ||
+ | |||
+ | |||
+ | |||
+ | ==Description== | ||
+ | |||
+ | The Bywaf application is built on Python's built-in cmd.Cmd class. Cmd | ||
+ | is a lightweight command interpreter loop that provides several useful | ||
+ | facilities for the developer, including overridable hook methods and | ||
+ | easy addition of commands and help. For the user, it offers | ||
+ | commandline editing with readline, including automatic tab completion | ||
+ | of commands, command options and filenames. | ||
+ | |||
+ | Bywaf contains a sub-classed version of Cmd called Wafterpreter, which | ||
+ | adds some important additions, including: | ||
+ | |||
+ | - Loading and selecting plugins | ||
+ | - Getting and setting global and per-plugin options | ||
+ | - Additional methods exposing functionality to the plugins | ||
+ | - Backgrounding jobs, ending running jobs and querying job status | ||
+ | - Loading scripts from the the command-line or within the interpreter | ||
+ | - Loading, saving, showing and clearing the command history | ||
+ | |||
+ | Wafterpreter employs a simple plugin system consisting of python | ||
+ | modules containing commands exposed to the user (functions starting | ||
+ | with "do_") and a dictionary of user-modifiable options ("options"). | ||
+ | |||
+ | A number of Wafterpreter methods have been exposed to plugins, | ||
+ | allowing them to change the interpreter's behavior and access other | ||
+ | modules' options. | ||
+ | |||
+ | For notifications of changes in plugin options, Bywaf supports | ||
+ | callback functions. The Wafterpreter will call a function for a given | ||
+ | plugin option if it begins with "set_"; for example, for an option | ||
+ | like "FILENAME", the Wafterpreter will search for and call a | ||
+ | set_FILENAME(), if it exists. The Wafterpreter will also search for | ||
+ | and call "set_default()", if it exists, for any option that does not | ||
+ | have a specific setter function. Failing these attempts, Wafterpreter | ||
+ | will perform a direct assignment on the plugin's option. | ||
+ | |||
+ | ==Licensing== | ||
+ | This program is free software: you can redistribute it and/or modify | ||
+ | it under the terms of the GNU General Public License as published by | ||
+ | the Free Software Foundation, either version 3 of the License, or | ||
+ | Rafael Gil any later version. | ||
+ | |||
+ | This program is distributed in the hope that it will be useful, | ||
+ | but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
+ | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
+ | GNU General Public License for more details. | ||
+ | |||
+ | You should have received a copy of the GNU General Public License | ||
+ | along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
+ | |||
+ | Contact: | ||
+ | |||
+ | Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project | ||
+ | |||
+ | Mail: [email protected] | ||
+ | |||
+ | skype: depasonic0 | ||
+ | |||
+ | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == What is ByWaf? == | ||
+ | |||
+ | ByWaf provides: | ||
+ | |||
+ | * Pentesting tool | ||
+ | * Auditing tool | ||
+ | * so on | ||
+ | |||
+ | |||
+ | == Presentation == | ||
+ | |||
+ | On going... | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | == Project Leader == | ||
+ | |||
+ | Project leader's name: | ||
+ | |||
+ | * Rafael Gil | ||
+ | |||
+ | Development leader's name: | ||
+ | |||
+ | * Roey Katz | ||
+ | |||
+ | |||
+ | | valign="top" style="padding-left:25px;width:200px;" | | ||
+ | |||
+ | == Quick Download == | ||
+ | |||
+ | * https://github.com/depasonico/bywaf-owasp | ||
+ | |||
+ | |||
+ | |||
+ | == News and Events == | ||
+ | * [15 Nov 2013] Beta release | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | ==Classifications== | ||
+ | |||
+ | {| width="200" cellpadding="2" | ||
+ | |- | ||
+ | | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]] | ||
+ | | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=Builders]] | ||
+ | |- | ||
+ | | align="center" valign="top" width="50%"| [[File:Owasp-breakers-small.png|link=Breakers]] | ||
+ | |- | ||
+ | | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] | ||
+ | |- | ||
+ | | colspan="2" align="center" | [[File:Project_Type_Files_TOOL.jpg|link=]] | ||
+ | |} | ||
+ | |||
+ | |} | ||
+ | |||
+ | =FAQs= | ||
+ | |||
+ | On going... | ||
+ | |||
+ | = Acknowledgements = | ||
+ | ==Volunteers== | ||
+ | ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been: | ||
+ | |||
+ | |||
+ | Development team members: | ||
+ | |||
+ | * Adar Grof | ||
+ | * Chris Luciano | ||
+ | |||
+ | Tesnting team members: | ||
+ | |||
+ | * Luis Brauer | ||
+ | |||
+ | ==Others== | ||
+ | * Adan Bazan | ||
+ | |||
+ | = Road Map and Getting Involved = | ||
+ | As of ByWaf, the priorities are: | ||
+ | * Wafterpreter | ||
+ | * Base plugins | ||
+ | * Extra plugins | ||
+ | |||
+ | Involvement in the development and promotion of ByWaf is actively encouraged! | ||
+ | You do not have to be a security expert in order to contribute. | ||
+ | Some of the ways you can help: | ||
+ | * Development | ||
+ | * Researching | ||
+ | * Promoting | ||
+ | |||
+ | |||
+ | |||
+ | =Project About= | ||
{{Template:Project About | {{Template:Project About | ||
− | |||
− | |||
| project_description =Desarrollar una aplicación que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de "detectar, evadir y dar un resultado (vulnerabilidad)" utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional. | | project_description =Desarrollar una aplicación que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de "detectar, evadir y dar un resultado (vulnerabilidad)" utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional. | ||
Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience. | Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience. | ||
Line 11: | Line 184: | ||
| project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap | | project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap | ||
}} | }} | ||
+ | |||
+ | __NOTOC__ <headertabs /> | ||
+ | |||
+ | [[Category:OWASP Project]] [[Category:OWASP_Breakers]] [[Category:OWASP Tool]] |
Latest revision as of 05:14, 14 November 2013
ByWafByWaf is a command-line tool for streamlining web application firewall auditing. It consists of a command-line interpreter and a set of plugins. IntroductionDevelop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.
DescriptionThe Bywaf application is built on Python's built-in cmd.Cmd class. Cmd is a lightweight command interpreter loop that provides several useful facilities for the developer, including overridable hook methods and easy addition of commands and help. For the user, it offers commandline editing with readline, including automatic tab completion of commands, command options and filenames. Bywaf contains a sub-classed version of Cmd called Wafterpreter, which adds some important additions, including: - Loading and selecting plugins - Getting and setting global and per-plugin options - Additional methods exposing functionality to the plugins - Backgrounding jobs, ending running jobs and querying job status - Loading scripts from the the command-line or within the interpreter - Loading, saving, showing and clearing the command history Wafterpreter employs a simple plugin system consisting of python modules containing commands exposed to the user (functions starting with "do_") and a dictionary of user-modifiable options ("options"). A number of Wafterpreter methods have been exposed to plugins, allowing them to change the interpreter's behavior and access other modules' options. For notifications of changes in plugin options, Bywaf supports callback functions. The Wafterpreter will call a function for a given plugin option if it begins with "set_"; for example, for an option like "FILENAME", the Wafterpreter will search for and call a set_FILENAME(), if it exists. The Wafterpreter will also search for and call "set_default()", if it exists, for any option that does not have a specific setter function. Failing these attempts, Wafterpreter will perform a direct assignment on the plugin's option. LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or Rafael Gil any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. Contact: Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project Mail: [email protected] skype: depasonic0 |
What is ByWaf?ByWaf provides:
PresentationOn going...
Project LeaderProject leader's name:
Development leader's name:
|
Quick Download
News and Events
Classifications
|
On going...
Volunteers
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:
Development team members:
- Adar Grof
- Chris Luciano
Tesnting team members:
- Luis Brauer
Others
- Adan Bazan
As of ByWaf, the priorities are:
- Wafterpreter
- Base plugins
- Extra plugins
Involvement in the development and promotion of ByWaf is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- Development
- Researching
- Promoting
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|