This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Bywaf Project"

From OWASP
Jump to: navigation, search
m (Quick Download)
 
(17 intermediate revisions by 5 users not shown)
Line 1: Line 1:
 
=Main=
 
=Main=
  
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
+
<!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE -->
 +
<div style="width:100%;height:100px;border:0,margin:0;overflow: hidden;">[[Image:OWASP Inactive Banner.jpg|800px| link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Inactive_Projects]] </div>
 +
 
  
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
Line 8: Line 10:
 
==ByWaf==
 
==ByWaf==
  
ByWaf is a command-line tool for streamlining web application firewall
+
ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem)
auditing. It consists of a command-line interpreter and a set of
 
plugins.
 
  
 
==Introduction==
 
==Introduction==
  
Develop an application that streamlines the auditor's job when making a Pen Test.  
+
This framework is a platform to create, store and execute python tools for Web application penetration testing.
It's main fuction is to detect, evade and display vulnerabilities.  
+
The main concept was to create something similar to metasploit.
The tool works using coding methods developed by our teammembers throughout their experience.
+
 
 +
 
 +
==Description==
 +
 
 +
As part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE.
 +
 
 +
==Setup==
 +
 
 +
You need to run setup.sh to configure the tool and environment under: setup/setup.sh
 +
ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited.
 +
 
 +
  ./setup
 +
 
 +
      -c|--clean    = Force Clean Install Of Any Dependencies
 +
      -s|--silent  = Automates the installation
 +
      -h|--help    = Show This Help Menu
 +
 
  
 +
==Execution==
  
 +
ByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational.
  
==Description==
+
  --update Update ByWaf to the latest version at github
 +
  --version Displays version and quits
  
The Bywaf application is built on Python's built-in cmd.Cmd class. Cmd
+
The second mode is the interactive mode in order to run it:
is a lightweight command interpreter loop that provides several useful
 
facilities for the developer, including overridable hook methods and
 
easy addition of commands and help.  For the user, it offers
 
commandline editing with readline, including automatic tab completion
 
of commands, command options and filenames.
 
  
Bywaf contains a sub-classed version of Cmd called Wafterpreter, which
+
  ./bywaf.py or python bywaf.py
adds some important additions, including:
 
  
  - Loading and selecting plugins
+
==Features==
  - Getting and setting global and per-plugin options
 
  - Additional methods exposing functionality to the plugins
 
  - Backgrounding jobs, ending running jobs and querying job status
 
  - Loading scripts from the the command-line or within the interpreter 
 
  - Loading, saving, showing and clearing the command history
 
  
Wafterpreter employs a simple plugin system consisting of python
+
[+] Auto-tab
modules containing commands exposed to the user (functions starting
 
with "do_") and a dictionary of user-modifiable options ("options").
 
  
A number of Wafterpreter methods have been exposed to plugins,
+
[+] Auto-fill
allowing them to change the interpreter's behavior and access other
 
modules' options.
 
  
For notifications of changes in plugin options, Bywaf supports
+
[+] Internal commands:
callback functions.  The Wafterpreter will call a function for a given
+
  [-] info
plugin option if it begins with "set_"; for example, for an option
+
  [-] options
like "FILENAME", the Wafterpreter will search for and call a
 
set_FILENAME(), if it exists.  The Wafterpreter will also search for
 
and call "set_default()", if it exists, for any option that does not
 
have a specific setter function.  Failing these attempts, Wafterpreter
 
will perform a direct assignment on the plugin's option.
 
  
 
==Licensing==
 
==Licensing==
Line 87: Line 86:
 
* Auditing tool
 
* Auditing tool
 
* so on
 
* so on
 
 
== Presentation ==
 
 
On going...
 
 
 
  
  
Line 101: Line 93:
  
 
* [mailto:[email protected] Rafael Gil]
 
* [mailto:[email protected] Rafael Gil]
 
Development leader's name:
 
 
* Roey Katz
 
 
 
| valign="top"  style="padding-left:25px;width:200px;" |
 
  
 
== Quick Download ==
 
== Quick Download ==
  
* https://github.com/depasonico/bywaf-owasp
+
* [https://github.com/depasonico/ByWaf-RE GitHub]
  
 +
== Sponsors ==
  
 +
[http://wingware.com/ Wingware]
  
 
== News and Events ==
 
== News and Events ==
* [15 Nov 2013] Beta release
+
* Tool presented at OWASP appsec EU in Cambridge June 2014
 
+
* [Nov 15 2013] Beta release
 
+
* [May  4 2014] Release v1.0
 
 
  
 
==Classifications==
 
==Classifications==
Line 137: Line 123:
 
|}
 
|}
  
=FAQs=
+
=Screenshots=
 +
 
 +
[[File:Bywaf_setup.JPG]]
 +
 
 +
  [+] Setup execution
 +
 
 +
[[File:ByWaf_RE_Main_Menu.jpeg]]
 +
 
 +
  [+] ByWaf RE Main Menu in interactive mode
 +
 
 +
[[File:Bywaf_payload_menu.JPG]]
 +
 
 +
  [+] Payload menu
  
On going...
 
  
 
= Acknowledgements =
 
= Acknowledgements =
Line 145: Line 142:
 
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:
 
ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:
  
 +
Veil Team:
  
Development team members:
+
[https://www.veil-framework.com/ Thank you All]
 
 
* Adar Grof
 
* Chris Luciano
 
 
 
Testing team members:
 
 
 
* Luis Brauer
 
  
==Others==
 
* Adan Bazan
 
  
 
= Road Map and Getting Involved =
 
= Road Map and Getting Involved =
 
As of ByWaf, the priorities are:
 
As of ByWaf, the priorities are:
* Wafterpreter
+
* Create more payloads
* Base plugins
 
* Extra plugins
 
  
 
Involvement in the development and promotion of ByWaf is actively encouraged!
 
Involvement in the development and promotion of ByWaf is actively encouraged!

Latest revision as of 12:49, 29 June 2016

OWASP Inactive Banner.jpg


ByWaf

ByWaf is back this time we used a framework called Veil this helps us to do the main core of the system for this reason the new ByWaf is called ByWaf RE (requiem)

Introduction

This framework is a platform to create, store and execute python tools for Web application penetration testing. The main concept was to create something similar to metasploit.


Description

As part of this framework different components are provided to help contributors to add their own tools and execute them through ByWaf RE.

Setup

You need to run setup.sh to configure the tool and environment under: setup/setup.sh ByWaf Re is portable using python standard libraries however for Windows environment some components and functionality is limited.

 ./setup
     -c|--clean    = Force Clean Install Of Any Dependencies
     -s|--silent   = Automates the installation
     -h|--help     = Show This Help Menu 


Execution

ByWaf Re has two modes to operate one is a simple command line execution where the functionality is just informational.

 --update Update ByWaf to the latest version at github
 --version Displays version and quits

The second mode is the interactive mode in order to run it:

  ./bywaf.py or python bywaf.py

Features

[+] Auto-tab

[+] Auto-fill

[+] Internal commands:

  [-] info
  [-] options

Licensing

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or Rafael Gil any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see <http://www.gnu.org/licenses/>.

Contact:

Home: https://www.owasp.org/index.php/OWASP_Bywaf_Project

Mail: [email protected]

skype: depasonic0

What is ByWaf?

ByWaf provides:

  • Pentesting tool
  • Auditing tool
  • so on


Project Leader

Project leader's name:

Quick Download

Sponsors

Wingware

News and Events

  • Tool presented at OWASP appsec EU in Cambridge June 2014
  • [Nov 15 2013] Beta release
  • [May 4 2014] Release v1.0

Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-breakers-small.png
Cc-button-y-sa-small.png
Project Type Files TOOL.jpg

Bywaf setup.JPG

 [+] Setup execution

ByWaf RE Main Menu.jpeg

 [+] ByWaf RE Main Menu in interactive mode

Bywaf payload menu.JPG

 [+] Payload menu


Volunteers

ByWaf is developed by a worldwide team of volunteers. The primary contributors to date have been:

Veil Team:

Thank you All


As of ByWaf, the priorities are:

  • Create more payloads

Involvement in the development and promotion of ByWaf is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:

  • Development
  • Researching
  • Promoting


PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: N/A
Purpose: Desarrollar una aplicación que agiliza el trabajo de un auditor a la hora de hacer un PenTest, su principal función es la de "detectar, evadir y dar un resultado (vulnerabilidad)" utilizando métodos conocidos de inyección de códigos y otros desarrollados por los integrantes a lo largo de su trayectoria profesional.

Develop an application that streamlines the auditor's job when making a Pen Test. It's main fuction is to detect, evade and display vulnerabilities. The tool works using coding methods developed by our teammembers throughout their experience.

License: GNU GPL v3 License (allows commercial use, but requires that modifications to your code stay open source, thus prohibiting proprietary forks of your project)
who is working on this project?
Project Leader(s):
  • Rafael Gil @
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: Mailing List Archives
Project Roadmap: View
Key Contacts
  • Contact Rafael Gil @ to contribute to this project
  • Contact Rafael Gil @ to review or sponsor this project
current release
pending
last reviewed release
pending


other releases