This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Wapiti Project"
(→In Print) |
|||
(6 intermediate revisions by 2 users not shown) | |||
Line 9: | Line 9: | ||
=Main= | =Main= | ||
− | <div style="width:100%;height: | + | <!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --> |
+ | <div style="width:100%;height:100px;border:0,margin:0;overflow: hidden;">[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] </div> | ||
+ | |||
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | {| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |- | ||
Line 43: | Line 45: | ||
https://www.openhub.net/p/wapiti | https://www.openhub.net/p/wapiti | ||
+ | |||
+ | Salesforge: https://sourceforge.net/projects/wapiti/ | ||
| valign="top" style="padding-left:25px;width:200px;" | | | valign="top" style="padding-left:25px;width:200px;" | | ||
Line 59: | Line 63: | ||
{| width="200" cellpadding="2" | {| width="200" cellpadding="2" | ||
|- | |- | ||
− | | align="center" valign="top" width="50%" rowspan="2"| [[File: | + | | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]] |
| align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]] | | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=]] | ||
|- | |- | ||
Line 73: | Line 77: | ||
=FAQs= | =FAQs= | ||
− | ; | + | ; What are the features? |
− | : | + | : Features |
− | + | *Fast and easy to use | |
− | + | *Generates vulnerability reports in various formats (HTML, XML, JSON, TXT...) | |
− | : | + | *Can suspend and resume a scan or an attack |
+ | *Can give you colors in the terminal to highlight vulnerabilities | ||
+ | *Different levels of verbosity | ||
+ | *Adding a payload can be as easy as adding a line to a text file | ||
+ | *Support HTTP and HTTPS proxies | ||
+ | *Authentication via several methods : Basic, Digest, Kerberos or NTLM | ||
+ | *Ability to restrain the scope of the scan (domain, folder, webpage) | ||
+ | *Safeguards against scan endless-loops (max number of values for a parameter) | ||
+ | *Can exclude some URLs of the scan and attacks (eg: logout URL) | ||
+ | *Extract URLs from Flash SWF files | ||
+ | *Try to extract URLs from javascript (very basic JS interpreter) | ||
+ | *... and more features described on the website ! | ||
= Acknowledgements = | = Acknowledgements = | ||
Line 88: | Line 103: | ||
==Others== | ==Others== | ||
− | |||
− | |||
= Road Map and Getting Involved = | = Road Map and Getting Involved = |
Latest revision as of 06:37, 23 February 2016
|
|
---|---|
OWASP Wapiti ProjectWapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable. IntroductionWeb application vulnerability scanner / security auditor.
DescriptionWapiti allows to audit the security of web applications in an easy way. It performs a "black-box" scans acting like a fuzzer, injecting payloads to see if an application is vulnerable. It has two principal parts, a crawler that explores the pages of the application and the attack module that injects the payloads and evaluates their responses. Wapiti is easy to use and it can detect the most common vulnerabilities (XSS, SQL Injection, File Handler Errors...). It provides to the user a complete report (html format) with the found vulnerabilities.
LicensingOWASP Wapiti Project is free to use. It is licensed under the GNU Library or Lesser General Public License (LGPL).
|
Project Leader
Openhubhttps://www.openhub.net/p/wapiti Salesforge: https://sourceforge.net/projects/wapiti/ |
Quick DownloadDownload the latest release here. Email ListNews and EventsClassifications |
- What are the features?
- Features
- Fast and easy to use
- Generates vulnerability reports in various formats (HTML, XML, JSON, TXT...)
- Can suspend and resume a scan or an attack
- Can give you colors in the terminal to highlight vulnerabilities
- Different levels of verbosity
- Adding a payload can be as easy as adding a line to a text file
- Support HTTP and HTTPS proxies
- Authentication via several methods : Basic, Digest, Kerberos or NTLM
- Ability to restrain the scope of the scan (domain, folder, webpage)
- Safeguards against scan endless-loops (max number of values for a parameter)
- Can exclude some URLs of the scan and attacks (eg: logout URL)
- Extract URLs from Flash SWF files
- Try to extract URLs from javascript (very basic JS interpreter)
- ... and more features described on the website !
Volunteers
Wapiti is developed by a worldwide team of volunteers. The primary contributors to date have been:
Others
As of July, the priorities are:
- xxx
- xxx
- xxx
Involvement in the development and promotion of Wapiti is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- xxx
- xxx
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
This category currently contains no pages or media.