As we have shared some web application vulnerability scanner to use and find the vulnerable on your web application,Websecurify can be work on multiple plate form like windows, Linux and Mac. While there are some tools that works only on Linux plate form and that tools are reliable and easy to work.
So you need to scan a web application for various means and for various attack(s).
In this article we will cover Wapiti a web application vulnerability scanner, Wapiti allows you to audit the security of your web applications. It is works on the phenomena of blackbox testing, it is scan the web page regardless the source code while scanners normally scan and read source code, it will look around the forms, search and comment windows to inject the data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable. It is based on ppython programming language and currently available for Linux based operating system.
It Is Help To Detect Following Vulnerabilities
- File Handling Errors (Local and remote include/require, fopen, readfile…)
- Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections)
- XSS (Cross Site Scripting) Injection
- LDAP Injection
- Command Execution detection (eval(), system(), passtru()…)
- CRLF Injection (HTTP Response Splitting, session fixation…)
It is not available for GUI, you have to work by using a terminal, Here is an exemple of output against a vulnerable web application.After the scanning it generates a report file of this scan, the report seems to be a professional report.
python wapiti.py http://server.com/base/url/ [options]
python wapiti.py http://server.com/base/url/-h