This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Bywaf Project"
(Undo revision 163281 by Rafael Gil Larios (talk)) |
Depasonico (talk | contribs) m (→Quick Download) |
||
(22 intermediate revisions by 5 users not shown) | |||
Line 1: | Line 1: | ||
=Main= | =Main= | ||
− | Project | + | |
+ | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> | ||
+ | <div style="width:100%;height:100px;border:0,margin:0;overflow: hidden;">[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] </div> | ||
+ | |||
+ | |||
+ | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
+ | | valign="top" style="border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | ==ByWaf== | ||
+ | |||
+ | ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem) | ||
+ | |||
+ | ==Introduction== | ||
+ | |||
+ | This framework is a platform to create, store and execute python tools for Web application penetration testing. | ||
+ | The main concept was to create something similar to metasploit. | ||
+ | |||
+ | |||
+ | ==Description== | ||
+ | |||
+ | As part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE. | ||
+ | |||
+ | ==Setup== | ||
+ | |||
+ | You need to run setup.sh to configure the tool and environment under: setup/setup.sh | ||
+ | ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited. | ||
+ | |||
+ | ./setup | ||
+ | |||
+ | -c|--clean = Force Clean Install Of Any Dependencies | ||
+ | -s|--silent = Automates the installation | ||
+ | -h|--help = Show This Help Menu | ||
+ | |||
+ | |||
+ | ==Execution== | ||
+ | |||
+ | ByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational. | ||
+ | |||
+ | --update Update ByWaf to the latest version at github | ||
+ | --version Displays version and quits | ||
+ | |||
+ | The second mode is the interactive mode in order to run it: | ||
+ | |||
+ | ./bywaf.py or python bywaf.py | ||
+ | |||
+ | ==Features== | ||
+ | |||
+ | [+] Auto-tab | ||
+ | |||
+ | [+] Auto-fill | ||
+ | |||
+ | [+] Internal commands: | ||
+ | [-] info | ||
+ | [-] options | ||
+ | |||
+ | ==Licensing== | ||
+ | This program is free software: you can redistribute it and/or modify | ||
+ | it under the terms of the GNU General Public License as published by | ||
+ | the Free Software Foundation, either version 3 of the License, or | ||
+ | Rafael Gil any later version. | ||
+ | |||
+ | This program is distributed in the hope that it will be useful, | ||
+ | but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
+ | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
+ | GNU General Public License for more details. | ||
+ | |||
+ | You should have received a copy of the GNU General Public License | ||
+ | along with this program. If not, see <http://www.gnu.org/licenses/>. | ||
+ | |||
+ | Contact: | ||
+ | |||
+ | Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project | ||
+ | |||
+ | Mail: [email protected] | ||
+ | |||
+ | skype: depasonic0 | ||
+ | |||
+ | | valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" | | ||
+ | |||
+ | == What is ByWaf? == | ||
+ | |||
+ | ByWaf provides: | ||
+ | |||
+ | * Pentesting tool | ||
+ | * Auditing tool | ||
+ | * so on | ||
+ | |||
+ | |||
+ | == Project Leader == | ||
+ | |||
+ | Project leader's name: | ||
+ | |||
+ | * [mailto:[email protected] Rafael Gil] | ||
+ | |||
+ | == Quick Download == | ||
+ | |||
+ | * [https://github.com/depasonico/ByWaf-RE GitHub] | ||
+ | |||
+ | == Sponsors == | ||
+ | |||
+ | [http://wingware.com/ Wingware] | ||
+ | |||
+ | == News and Events == | ||
+ | * Tool presented at OWASP appsec EU in Cambridge June 2014 | ||
+ | * [Nov 15 2013] Beta release | ||
+ | * [May 4 2014] Release v1.0 | ||
+ | |||
+ | ==Classifications== | ||
+ | |||
+ | {| width="200" cellpadding="2" | ||
+ | |- | ||
+ | | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]] | ||
+ | | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=Builders]] | ||
+ | |- | ||
+ | | align="center" valign="top" width="50%"| [[File:Owasp-breakers-small.png|link=Breakers]] | ||
+ | |- | ||
+ | | colspan="2" align="center" | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] | ||
+ | |- | ||
+ | | colspan="2" align="center" | [[File:Project_Type_Files_TOOL.jpg|link=]] | ||
+ | |} | ||
+ | |||
+ | |} | ||
+ | |||
+ | =Screenshots= | ||
+ | |||
+ | [[File:Bywaf_setup.JPG]] | ||
+ | |||
+ | [+] Setup execution | ||
+ | |||
+ | [[File:ByWaf_RE_Main_Menu.jpeg]] | ||
+ | |||
+ | [+] ByWaf RE Main Menu in interactive mode | ||
+ | |||
+ | [[File:Bywaf_payload_menu.JPG]] | ||
+ | |||
+ | [+] Payload menu | ||
+ | |||
+ | |||
+ | = Acknowledgements = | ||
+ | ==Volunteers== | ||
+ | ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been: | ||
+ | |||
+ | Veil Team: | ||
+ | |||
+ | [https://www.veil-framework.com/ Thank you All] | ||
+ | |||
+ | |||
+ | = Road Map and Getting Involved = | ||
+ | As of ByWaf, the priorities are: | ||
+ | * Create more payloads | ||
+ | |||
+ | Involvement in the development and promotion of ByWaf is actively encouraged! | ||
+ | You do not have to be a security expert in order to contribute. | ||
+ | Some of the ways you can help: | ||
+ | * Development | ||
+ | * Researching | ||
+ | * Promoting | ||
+ | |||
+ | |||
=Project About= | =Project About= | ||
− | {{:Projects/OWASP_Bywaf_Project}} | + | {{Template:Project About |
+ | | project_description =Desarrollar una aplicación que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de "detectar, evadir y dar un resultado (vulnerabilidad)" utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional. | ||
+ | Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience. | ||
+ | | | ||
+ | | project_license =GNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project) | ||
+ | | leader_name1 =Rafael Gil | ||
+ | | leader_email1 [email protected] | ||
+ | | mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp_bywaf_project | ||
+ | | project_road_map = https://www.owasp.org/index.php/Projects/OWASP_Bywaf_Project/Roadmap | ||
+ | }} | ||
+ | |||
+ | __NOTOC__ <headertabs /> | ||
− | [[Category:OWASP Project]] | + | [[Category:OWASP Project]] [[Category:OWASP_Breakers]] [[Category:OWASP Tool]] |
Latest revision as of 12:49, 29 June 2016
ByWafByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem) IntroductionThis framework is a platform to create, store and execute python tools for Web application penetration testing. The main concept was to create something similar to metasploit.
DescriptionAs part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE. SetupYou need to run setup.sh to configure the tool and environment under: setup/setup.sh ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited. ./setup -c|--clean = Force Clean Install Of Any Dependencies -s|--silent = Automates the installation -h|--help = Show This Help Menu
ExecutionByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational. --update Update ByWaf to the latest version at github --version Displays version and quits The second mode is the interactive mode in order to run it: ./bywaf.py or python bywaf.py Features[+] Auto-tab [+] Auto-fill [+] Internal commands: [-] info [-] options LicensingThis program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or Rafael Gil any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>. Contact: Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project Mail: [email protected] skype: depasonic0 |
What is ByWaf?ByWaf provides:
Project LeaderProject leader's name: Quick DownloadSponsorsNews and Events
Classifications |
Volunteers
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:
Veil Team:
As of ByWaf, the priorities are:
- Create more payloads
Involvement in the development and promotion of ByWaf is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- Development
- Researching
- Promoting
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|