The post Hacking websites with w3af appeared first on Information Security Newspaper | Hacking News.
]]>W3af is a tool used in auditing and exploitation of web applications. It’s an open source python based web vulnerability scanner. The tool also has GUI version.
Ethical hacker of iicybersecurity has found that w3af is used in exploiting many big tech companies privacy which shows the information that is not publicly available.
W3af does not come pre installed in kali linux, so for installing use the following steps:
How to install w3af in kali linux?
iicybersecurity@kali:~/w3af$ ./w3af_console
Your python installation needs the following modules to run w3af:
pybloomfilter phply nltk tblib pdfminer ndg lxml guess_language cluster ntlm Halberd darts .lib.utils vulndb markdown psutil ds_store mitmproxy ruamel.ordereddict Flask yaml tldextract pebble acora esmre diff_match_patch bravado_core lz4 vulners
After installing any missing operating system packages, use pip to install the remaining modules:
sudo pip install pybloomfiltermmap==0.3.14 phply==0.9.1 nltk==3.0.1 tblib==0.2.0 pdfminer= =20140328 ndg-httpsclient==0.4.0 lxml==3.4.4 guess-language==0.2 cluster==1.1.1b3 python-ntlm= =1.0.1 halberd==0.2.4 darts.util.lru==0.5 vulndb==0.1.0 markdown==2.6.1 psutil==2.2.1 ds-store ==1.1.2 mitmproxy==0.13 ruamel.ordereddict==0.4.8 Flask==0.10.1 PyYAML==3.12 tldextract==1.7.2 pebble==4.3.8 acora==2.1 esmre==0.3.1 diff-match-patch==20121119 bravado-core==5.0.2 lz4==1.1 .0 vulners==1.3.0
External programs used by w3af are not installed or were not found.Run these commands to install them on your system:
npm install -g retire
A script with these commands has been created for you at /tmp/w3af_dependency_install.sh
npm install -g retire
/usr/local/bin/retire -> /usr/local/lib/node_modules/retire/bin/retire
+ retire@2.0.1
added 84 packages from 83 contributors in 15.165s
root@kali:/home/iicybersecurity/w3af# ./w3af_console
Your python installation needs the following modules to run w3af:
pybloomfilter phply nltk tblib pdfminer ndg lxml guess_language cluster ntlm Halberd darts.lib.utils vulndb markdown psutil ds_store mitmproxy ruamel.ordereddict Flask yaml tldextract pebble acora esmre diff_match_patch bravado_core lz4 vulners
After installing any missing operating system packages, use pip to install the remaining modules:
sudo pip install pybloomfiltermmap==0.3.14 phply==0.9.1 nltk==3.0.1 tblib==0.2.0 pdfminer==20140328 ndg-httpsclient==0.4.0 lxml==3.4.4 guess-language==0.2 cluster==1.1.1b3 python-ntlm==1.0.1 halberd==0.2.4 darts.util.lru==0.5 vulndb==0.1.0 markdown==2.6.1 psutil==2.2.1 ds-store==1.1.2 mitmproxy==0.13 ruamel.ordereddict==0.4.8 Flask==0.10.1 PyYAML==3.12 tldextract==1.7.2 pebble==4.3.8 acora==2.1 esmre==0.3.1 diff-match-patch==20121119 bravado-core==5.0.2 lz4==1.1.0 vulners==1.3.0
A script with these commands has been created for you at /tmp/w3af_dependency_install.sh
In file included from src/lxml/lxml.etree.c:239:0:
/tmp/pip-build-uH3XZ6/lxml/src/lxml/includes/etree_defs.h:14:10: fatal error: libxml/xmlversion.h: No such file or directory
#include “libxml/xmlversion.h”
^~~~~~~~~~~~~~~~~~~~~
compilation terminated.
error: command ‘i686-linux-gnu-gcc’ failed with exit status
Can’t rollback lxml, nothing uninstalled.
Command “/usr/bin/python -u -c “import setuptools, tokenize;__file__=’/tmp/pip-build-uH3XZ6/lxml/setup.py’;f=getattr(tokenize, ‘open’, open)(__file__);code=f.read().replace(‘\r\n’, ‘\n’);f.close();exec(compile(code, __file__, ‘exec’))” install –record /tmp/pip-DgrWhh-record/install-record.txt –single-version-externally-managed –compile” failed with error code 1 in /tmp/pip-build-uH3XZ6/lxml/
w3af>>> target
w3af/config:target>>> set target https://testphp.vulnweb.com/
w3af/config:target>>> back
The configuration has been saved.
w3af>>> plugins
w3af/plugins>>> audit
w3af/plugins>>> audit all
w3af/plugins>>> back
w3af>>> start
The post Hacking websites with w3af appeared first on Information Security Newspaper | Hacking News.
]]>