WATOBO - THE Web Application Toolbox
How does it work?WATOBO works like a local proxy, similar to Webscarab, Paros or BurpSuite.
Additionally, WATOBO supports passive and active checks. Passive checks are more like filter functions. They are used to collect useful information, e.g. email or IP addresses. Passive checks will be performed during normal browsing activities. No additional requests are sent to the (web) application.
Active checks instead will produce a high number of requests (depending on the check module) because they do the automatic part of vulnerability identification, e.g. during a scan.
So why should I use WATOBO instead of other web application auditing tools?The most important advantages are:
- WATOBO has Session Management capabilities! You can define login scripts as well as logout signatures. So you don’t have to login manually each time you get logged out.
- WATOBO can perform vulnerability checks out of the box.
- WATOBO supports Inline De-/Encoding, so you don’t have to copy strings to a transcoder and back again. Just do it inside the request/response window with a simple mouse click.
- WATOBO has smart filter functions, so you can find and navigate to the most interesting parts of the application easily.
- WATOBO is written in (FX)Ruby and enables you to define your own checks
- WATOBO is free software ( licensed under the GNU General Public License Version 2)
- It’s by siberas
Supported operating systemsWATOBO is written in (FX)Ruby which should run on many different operating systems. WATOBO is developed primarily on Windows systems. Anyway, since version 0.9.2 WATOBO has also been tested successfully on:
- Windows (XP..Win7)
- Linux (Backtrack4, Ubuntu, openSUSE) - thanks to Dirk Wetter for Ubuntu and openSUSE notes
- Mac OS.
DownloadYou can download WATOBO at http://sourceforge.net/projects/watobo/ or by checking out the svn repo with the following command
svn co https://watobo.svn.sourceforge.net/svnroot/watobo watobo rel="nofollow"
WATOBO - THE Web Application Toolbox Reviewed by Ethical Hacking on 8:46 AM Rating: