w3af

From Wikipedia, the free encyclopedia
w3af
Developer(s)Andres Riancho
Stable release
1.6.49[1] Edit this on Wikidata / 7 April 2015; 10 June 2015; Error: first parameter cannot be parsed as a date or time. (7 April 2015; 10 June 2015)
Repository
Written inPython
Operating systemWindows, OS X, Linux, FreeBSD, OpenBSD
TypeComputer security
LicenseGPLv2
Websitewww.w3af.org

w3af (Web Application Attack and Audit Framework) is an open-source web application security scanner. The project provides a vulnerability scanner and exploitation tool for Web applications.[2] It provides information about security vulnerabilities for use in penetration testing engagements. The scanner offers a graphical user interface and a command-line interface.[3]

Architecture[edit]

w3af is divided into two main parts, the core and the plug-ins.[4] The core coordinates the process and provides features that are consumed by the plug-ins, which find the vulnerabilities and exploit them. The plug-ins are connected and share information with each other using a knowledge base.

Plug-ins can be categorized as Discovery, Audit, Grep, Attack, Output, Mangle, Evasion or Bruteforce.

History[edit]

w3af was started by Andres Riancho in March 2007, after many years of development by the community. In July 2010, w3af announced its sponsorship and partnership with Rapid7. With Rapid7's sponsorship the project will be able to increase its development speed and keep growing in terms of users and contributors.

See also[edit]


References[edit]

  1. ^ "Release 1.6.49". 7 April 2015. Retrieved 23 July 2018.
  2. ^ www.w3af.org
  3. ^ w3af documentation
  4. ^ Part 1 of Andres Riancho’s presentation “w3af - A framework to 0wn the Web “at Sector 2009, Download PDF

External links[edit]

Note: April 11, 2024 https://www.w3af.org is giving connection timed out failures. However, documentation is still accessible at http://docs.w3af.org/en/latest/. Redirected to W4af: https://github.com/w4af that is still in Alpha development