W3af Explained

w3af
Logo Size:124px
Developer:Andres Riancho
Operating System:Windows, OS X, Linux, FreeBSD, OpenBSD
Programming Language:Python
Genre:Computer security
License:GPLv2

w3af (Web Application Attack and Audit Framework) is an open-source web application security scanner. The project provides a vulnerability scanner and exploitation tool for Web applications.[1] It provides information about security vulnerabilities for use in penetration testing engagements. The scanner offers a graphical user interface and a command-line interface.[2]

Architecture

w3af is divided into two main parts, the core and the plug-ins.[3] The core coordinates the process and provides features that are consumed by the plug-ins, which find the vulnerabilities and exploit them. The plug-ins are connected and share information with each other using a knowledge base.

Plug-ins can be categorized as Discovery, Audit, Grep, Attack, Output, Mangle, Evasion or Bruteforce.

History

w3af was started by Andres Riancho in March 2007, after many years of development by the community. In July 2010, w3af announced its sponsorship and partnership with Rapid7. With Rapid7's sponsorship the project will be able to increase its development speed and keep growing in terms of users and contributors.

See also

External links

Note: April 11, 2024 https://www.w3af.org is giving connection timed out failures. However, documentation is still accessible at http://docs.w3af.org/en/latest/. Redirected to W4af: https://github.com/w4af that is still in Alpha development

Notes and References

  1. http://www.w3af.org www.w3af.org
  2. http://sourceforge.net/p/w3af/code/HEAD/tree/trunk/readme/EN/w3af-users-guide.pdf?format=raw w3af documentation
  3. Part 1 of Andres Riancho’s presentation “w3af - A framework to 0wn the Web “at Sector 2009, Download PDF