This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP/Training/OWASP Webslayer Project"
From OWASP
Sandra Paiva (talk | contribs) |
Cmartorella (talk | contribs) |
||
Line 37: | Line 37: | ||
| | ||
| Material = | | Material = | ||
− | The training is a hands on course, so it is recommended to bring your own laptop | + | The training is a hands on course, so it is recommended to bring your own laptop (it´s possible to follow the training without a computer) |
− | The latest version of Webslayer can be downloaded from: | + | The latest version of Webslayer can be downloaded from google code subversion: |
*[http://code.google.com/p/webslayer/downloads/list Webslayer] | *[http://code.google.com/p/webslayer/downloads/list Webslayer] | ||
}} | }} |
Revision as of 00:04, 15 December 2010
MODULE | |
' | |
Overview & Goal | |
WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc.
The tools have a payload generator and a easy and powerful results analyzer.
Some features are:
| |
Contents | Materials |
The training will show how to use the tool and will cover the following topics:
|
The training is a hands on course, so it is recommended to bring your own laptop (it´s possible to follow the training without a computer)
The latest version of Webslayer can be downloaded from google code subversion: |