Wapiti-Web application vulnerability scanner

As we have shared some web application vulnerability scanner to use and find the vulnerable on your web application,Websecurify can be work on multiple plate form like windows, Linux and Mac. While there are some tools that works only on Linux plate form and that tools are reliable and easy to work.
So you need to scan a web application for various means and for various attack(s).
In this article we will cover Wapiti a web application vulnerability scanner, Wapiti allows you to audit the security of your web applications. It is works on the phenomena of blackbox testing, it is scan the web page regardless the source code while scanners normally scan and read source code, it will look around the forms, search and comment windows to inject the data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable. It is based on ppython programming language and currently available for Linux based operating system.

It Is Help To Detect Following Vulnerabilities 

  • File Handling Errors (Local and remote include/require, fopen, readfile…)
  • Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections)
  • XSS (Cross Site Scripting) Injection
  • LDAP Injection
  • Command Execution detection (eval(), system(), passtru()…)
  • CRLF Injection (HTTP Response Splitting, session fixation…)

It is not available for GUI, you have to work by using a terminal, Here is an exemple of output against a vulnerable web application.After the scanning it generates a report file of this scan, the report seems to be a professional report.


Tutorial

python wapiti.py http://server.com/base/url/ [options]
python wapiti.py http://server.com/base/url/-h

 




Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...