This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP/Training/OWASP Webslayer Project"
From OWASP
Sandra Paiva (talk | contribs) |
Sandra Paiva (talk | contribs) |
||
Line 39: | Line 39: | ||
The training is a hands on course, so it is recommended to bring your own laptop (it´s possible to follow the training without a computer) | The training is a hands on course, so it is recommended to bring your own laptop (it´s possible to follow the training without a computer) | ||
− | The latest version of Webslayer can be downloaded from google code subversion | + | The latest version of Webslayer can be downloaded from google code subversion [http://code.google.com/p/webslayer/downloads/list here]. |
− | |||
− | |||
<br> | <br> |
Revision as of 20:22, 22 December 2010
MODULE | |
' | |
Overview & Goal | |
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc.
The tools have a payload generator and a easy and powerful results analyzer.
Some features are:
| |
Contents | Materials |
The training will show how to use the tool and will cover the following topics:
|
The training is a hands on course, so it is recommended to bring your own laptop (it´s possible to follow the training without a computer)
The latest version of Webslayer can be downloaded from google code subversion here.
|