This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Project Information:template Wapiti Project

From OWASP
Revision as of 16:07, 9 January 2009 by Paulo Coimbra (talk | contribs) (THIS PROJECT PAGE IS UNDER WORK AND CONTAINS WRONG INFORMATION)

Jump to: navigation, search

PROJECT INFORMATION
Project Name OWASP Wapiti Project
Web application vulnerability scanner / security auditor
Short Project Description
  • Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but it will scan the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.
  • Wapiti can detect the following vulnerabilities :
    • File Handling Errors (Local and remote include/require, fopen, readfile...)
    • Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections)
    • XSS (Cross Site Scripting) Injection
    • LDAP Injection
    • Command Execution detection (eval(), system(), passtru()...)
    • CRLF Injection (HTTP Response Splitting, session fixation...)
Key Project Information Project Leader
Alberto Pastor Nieto
Nicolas Surribas
Project Contibutors
Name
Mailing List
Subscribe here
Use here
License
GNU "Lesser" GNU Public License (LGPL)
Project Type
Tool
Sponsors
if any, add link
Release Status Main Links Related Projects
Provisory Apha Quality
(under review)
Please see here for complete information.

OWASP Wapiti Project

If any, add link