1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175
|
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=utf-8">
<TITLE></TITLE>
<META NAME="GENERATOR" CONTENT="OpenOffice.org 2.4 (Linux)">
<META NAME="CREATED" CONTENT="20070514;16454200">
<META NAME="CHANGEDBY" CONTENT="Facundo Batista">
<META NAME="CHANGED" CONTENT="20080925;16305700">
<STYLE TYPE="text/css">
<!--
@page { size: 21.59cm 27.94cm; margin: 2cm }
P { margin-left: 0.5cm; text-indent: 0.5cm; margin-top: 0.3cm; margin-bottom: 0cm; text-align: justify }
H2 { margin-top: 0.8cm; margin-bottom: 0.2cm; background: transparent; page-break-before: auto }
H2.western { font-family: "Bitstream Vera Sans", sans-serif; font-size: 14pt; font-style: normal }
H2.cjk { font-family: "Bitstream Vera Sans"; font-size: 14pt; font-style: italic; font-weight: medium }
H2.ctl { font-family: "Bitstream Vera Sans"; font-size: 14pt; font-style: italic; font-weight: medium }
H3 { margin-top: 0.5cm; margin-bottom: 0.1cm }
H3.western { font-family: "Bitstream Vera Sans", sans-serif; font-size: 12pt }
H3.cjk { font-family: "Bitstream Vera Sans" }
H3.ctl { font-family: "Bitstream Vera Sans" }
P.cuerpo-de-texto-con-sangría { margin-left: 1.5cm }
-->
</STYLE>
</HEAD>
<BODY LANG="en-US" DIR="LTR">
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0.42cm; margin-bottom: 0.21cm; page-break-after: avoid">
<BR><BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0.42cm; margin-bottom: 0.21cm; page-break-after: avoid">
<BR><BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0.42cm; margin-bottom: 0.21cm; page-break-after: avoid">
<BR><BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0.42cm; margin-bottom: 0.21cm; page-break-after: avoid">
<BR><BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0.42cm; margin-bottom: 0.21cm; page-break-after: avoid">
<BR><BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0.42cm; margin-bottom: 0.21cm; page-break-after: avoid">
<FONT FACE="Bitstream Vera Sans, sans-serif"><FONT SIZE=4 STYLE="font-size: 16pt"><U><B>w3af
gtkUi User Guide</B></U></FONT></FONT></P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm; font-style: normal; font-weight: medium; text-decoration: none">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm; font-style: normal; font-weight: medium; text-decoration: none">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm; font-style: normal; font-weight: medium; text-decoration: none">
<FONT SIZE=2>Document version: <B>0.2</B></FONT></P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm; font-style: normal; font-weight: medium; text-decoration: none">
<FONT SIZE=2>Original author: <B>Facundo Batista</B></FONT></P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm; font-style: normal; font-weight: medium; text-decoration: none">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm; font-style: normal; font-weight: medium; text-decoration: none">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm; font-style: normal; text-decoration: none">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm; font-style: normal; text-decoration: none">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<FONT SIZE=2><I><U><B>September, 2008</B></U></I></FONT></P>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm; page-break-before: always">
<BR>
</P>
<DIV ID="Índice de contenido1" DIR="LTR">
<DIV ID="Table of Contents1_Head" DIR="LTR">
<P ALIGN=LEFT STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0.42cm; margin-bottom: 0.21cm; page-break-after: avoid">
<FONT FACE="Bitstream Vera Sans, sans-serif"><FONT SIZE=4 STYLE="font-size: 16pt"><B>Table
of Contents</B></FONT></FONT></P>
</DIV>
<P ALIGN=LEFT STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
1.Introduction 3</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">1.1.Just the
graphical interface 3</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">1.2.Running
the program 3</P>
<P ALIGN=LEFT STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
2.General structure 3</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">2.1.The
toolbar 4</P>
<P ALIGN=LEFT STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
3.Scanning 5</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">3.1.Configuring
the scan 5</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">3.2.Using
the Profiles 7</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">3.3.Running
the scan 8</P>
<P ALIGN=LEFT STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
4.Analyzing the results 10</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">4.1.Browsing
the Knowledge Base 10</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">4.2.Site
structure 12</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">4.3.Requests
and Responses 12</P>
<P ALIGN=LEFT STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
5.Exploitation 13</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">5.1.Executing
an exploit 14</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">5.2.Using a
shell 16</P>
<P ALIGN=LEFT STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
6.Other tools 16</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">6.1.Manual
Requests 16</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">6.2.Fuzzy
Requests 17</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">6.3.Encode
and Decode 19</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">6.4.Comparing
HTTP traffic 21</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">6.5.Using
the Proxy 21</P>
<P ALIGN=LEFT STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
7.Configurations 23</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">7.1.HTTP
Configuration 23</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">7.2.Miscellaneous
Configuration 24</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">7.3.Advanced
target 26</P>
<P ALIGN=LEFT STYLE="text-indent: 0cm; margin-top: 0cm">7.4.Proxy
Configuration 26</P>
</DIV>
<P ALIGN=CENTER STYLE="margin-left: 0cm; text-indent: 0cm; margin-top: 0cm">
<BR>
</P>
<OL>
<LI><H2 CLASS="western" STYLE="page-break-before: always"><A NAME="Introduction"></A><A NAME="SECTION00200000000000000000"></A>
Introduction</H2>
</OL>
<P>This document is a user guide for the 1.0 version of the Web
Application Attack and Audit Framework ( w3af ), its goal is to
provide a basic overview of how to use the application, how it works,
and what you can do with it.
</P>
<OL>
<OL>
<LI><H3 CLASS="western"><A NAME="Just_the_graphical_interface"></A>Just
the graphical interface</H3>
</OL>
</OL>
<P>w3af is a complete environment for auditing and attacking web
applications. This environment provides a solid platform for auditing
and penetration-testing.
</P>
<P>The w3af is a framework that you can use in different ways. This
document explains how to use it through the GTK Graphic User
Interface, but you can also use w3af from command line, and even new
user interfaces could be implemented in the future.</P>
<P>In any case, w3af is a core independent of the user interface, and
it will be referred as <I>the Core</I> throughout this documentation.
It's implemented in pure Python, as this graphic user interface.</P>
<OL>
<OL START=2>
<LI><H3 CLASS="western"><A NAME="Running_the_program"></A>Running
the program</H3>
</OL>
</OL>
<P>You can execute this program just doing double click in the icon,
or selecting it from you operating system menu after installing it.</P>
<P>You can also run it from command line calling to the <I>w3af_gui</I>
executable, and in this case you'll see any debug or warning message
appear in the terminal. If you need to submit a bug or ask for a new
feature, use this way to execute the program, because it'll provide
useful information about the Python and PyGTK versions.</P>
<OL START=2>
<LI><H2 CLASS="western"><A NAME="General_structure"></A>General
structure</H2>
</OL>
<P>In this section is explained the general structure of the w3af
Interface.
</P>
<P>The following is the main window, the first image that you'll see
from the system after it's completely loaded (during the load you'll
see a splash image that gives you information about how the system is
loading):</P>
<IMG SRC="gtkUiUsersGuide_html_m545886e1.png" NAME="graphics1" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=606 HEIGHT=355 BORDER=0><BR CLEAR=LEFT>
<P>In the image you can see different sections. On top, as usual
there's the menu [1] and the toolbar [2]. The body of the window is
separated in different notebook tabs [3]. At the bottom of the window
you have the the toolbar [4] and an indicator about the found
elements [5].</P>
<P>In the notebook tab that you can see at the program beginning,
there are three vertical panes: the profiles [6], the plugin selector
[7], and the plugin configuration area [8] (where so far you see the
w3af icon because you didn't select any plugin yet). Above them you
also have the target URL [9].</P>
<OL>
<OL>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="The_toolbar"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">The toolbar</FONT></H3>
</OL>
</OL>
<P>The toolbar is separated in different functional groupings.</P>
<IMG SRC="gtkUiUsersGuide_html_m1b308ac.png" NAME="graphics2" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=54 HEIGHT=46 BORDER=0><BR CLEAR=LEFT>
<P>The first button opens the <I>Point and Click Penetration Test</I>,
that is a <I>Wizard</I> that allows you to create profiles in an easy
way, without having specific security related knowledge.</P>
<IMG SRC="gtkUiUsersGuide_html_642cbc2.png" NAME="graphics4" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=136 HEIGHT=54 BORDER=0><BR CLEAR=LEFT>
<P>The second and third buttons, <I>New</I> and <I>Save</I>, operate
on the Profiles. <I>New</I> will create a new Profile, and for this
the system will ask you the profile name and a description, be
creative! If you change a profile, you also can save the
modifications it to disk, using the second button.</P>
<IMG SRC="gtkUiUsersGuide_html_1bd5f7b1.png" NAME="graphics3" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=137 HEIGHT=55 BORDER=0><BR CLEAR=LEFT>
<P>The third and fourth buttons, <I>Play</I> and <I>Pause</I>,
control the state of the working Core. These buttons are mutable, as
change over time, look the next section (<I>Running the scan</I>) for
a deeper explanation of how these buttons behave.</P>
<IMG SRC="gtkUiUsersGuide_html_19e0370.png" NAME="graphics5" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=98 HEIGHT=51 BORDER=0><BR CLEAR=LEFT>
<P>The sixth button is to trigger Multiple Exploits. It will be
enabled only in the Exploits window, check that part of the
documentation for a more detailed information about this.</P>
<P>The rest of the buttons are to open and use different tools:</P>
<IMG SRC="gtkUiUsersGuide_html_138eb8c6.png" NAME="graphics6" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=427 HEIGHT=54 BORDER=0><BR CLEAR=LEFT>
<P>Check the <I>Other Tools</I> section of the documentation for an
explanation of this different tools.</P>
<IMG SRC="gtkUiUsersGuide_html_33d39b79.png" NAME="graphics8" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=61 HEIGHT=54 BORDER=0><BR CLEAR=LEFT>
<P>Finally, at the very right, there's a throbber that shows when the
Core is working or not.</P>
<OL START=3>
<LI><H2 CLASS="western"><A NAME="Scanning"></A>Scanning</H2>
</OL>
<P>In this section is explained the different steps to configure,
start and supervise a security scanning over a web site.</P>
<OL>
<OL>
<LI><H3 CLASS="western"><A NAME="Configuring_the_scan"></A>Configuring
the scan</H3>
</OL>
</OL>
<P>To scan the web sites in different ways there are different
plugins that can be configured in different ways.
</P>
<P>In the second column of the main window you can select which
plugins to configure. This plugins are separated in two big sections,
as you can see in the following picture.</P>
<P>The first section has all the scan plugins, in the upper part of
the column [1]. There you have the different plugins grouped
regarding the scan type. They are separated in:</P>
<UL>
<LI><P CLASS="cuerpo-de-texto-con-sangría">audit</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría">bruteforce</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría">discovery</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría">evasion</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría">grep</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría">mangle</P>
</UL>
<IMG SRC="gtkUiUsersGuide_html_m2d93f383.png" NAME="graphics7" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=606 HEIGHT=355 BORDER=0><BR CLEAR=LEFT>
<P>In the lower part of the column [2] there are the output plugins.
As this is the GTK user interface, the gtkOutput plugin is always
enabled, but note that you can enable here the console plugin to see
all the information in the standard output, and also have plugins to
send all that information to a file in different formats.</P>
<P>If you select on any plugin you will see in the right pane [3]
some information of that plugin. If that plugin is configurable
(something that you can know in advance, because the plugin has an
editable icon in the plugin trees [1] & [2].
</P>
<P>To configure the plugin, just select it, and modify the options
that appears on in the right pane [3]. Note that you need to Save the
configuration to use it. You can see easily if any plugin is modified
and not saved because its name will be in bold font.</P>
<P>Even if you configure a plugin, to actually use it during a scan,
you need to check it. You have, at the right of each plugin, a check
box that you need to select to use that plugin during the scan. If
you click on the group check box, all the plugins in that group will
be selected and deselected. If some plugins in that group are
selected, and others are not, you'll see the group's check box in an
intermediary state (as you can see in [2] for <I>output</I>).</P>
<P>If you make right-click over a plugin (or select <I><SPAN STYLE="text-decoration: none">Edit
Plugin </SPAN></I>in the Edit menu), a text editor will open and
you'll be able to actually edit the plugin source code.</P>
<P>To finish configuration the scan, you need to insert a target URL
in the upper text entry. When everything is ready to run, you will
note that the Play buttons are automatically enabled.</P>
<OL>
<OL START=2>
<LI><H3 CLASS="western"><A NAME="Using_the_Profiles"></A>Using the
Profiles</H3>
</OL>
</OL>
<P>In the profiles you can save different configurations. You can
think a Profile as the collection of configured plugins and target
URL.</P>
<P>In the column of the left [1] you can see which plugins do you
have:</P>
<IMG SRC="gtkUiUsersGuide_html_40c50a7e.png" NAME="graphics9" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=606 HEIGHT=355 BORDER=0><BR CLEAR=LEFT>
<P>In this example, I selected a <I>test</I> plugin. In the moment I
select it, the plugins and the target URL are all reconfigured [2].
Also, in the pane at the right, you can see a description of that
plugin [3].</P>
<P>See, as now we have all the information needed to start the scan,
that the Start buttons [4] are enabled. Note, however, that is
possible that in the profile there was no saved URL, so the target
URL will remain empty (you'll find it with a “<I>Insert the target
URL here</I>” message).</P>
<P>In the Profiles menu,or doing right-click over any profile, you
can see different actions that you can apply over the plugins:</P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría">Save: Save the
actual configuration to the profile. This will be enabled only if
you changed some of the profile configuration.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría">Save as: Save
configuration a new profile, without affecting the one selected so
far. If you click on this option, you will need to enter a new
profile name and description.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría">Revert: Discard the
actual configuration and reload the one that is saved in the
profile.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría">Delete: Delete this
profile</P>
</UL>
<P><BR>
</P>
<P>To create a new profile, you have the <I>New</I> button in the
toolbar, and also the <I>New</I> option in the <I>Profiles</I> menu.
To create a new profile, you will need to enter a name and
descriptions. After creating the new profile, you'll be able to
configure to your needs. Remember that you can always create a new
profile using the Point and Click Penetration test tool, with the
Wizard button at the toolbar's left.</P>
<OL>
<OL START=3>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Running_the_scan"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Running the scan</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">To
actually run the scan some conditions need to be met: at least one
plugin needs to be activated, and a target URL must be set. You'll
notice that everything is OK to go, because the <I>Start</I> button
will be enabled.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_m6817cbb9.png" NAME="graphics10" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=73 HEIGHT=194 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
whole scan process is controlled with two buttons that you can find
in the toolbar. The first button is the <I>Start</I> one. When you
click on it, the scan will start running, and you will see the
throbber spinning. After the process starts, it can be stopped
anytime, or you can let it go until the end, and it will finish
automatically. To stop the process you can use the same button, note
that it mutated and now it is called <I>Stop</I>: if you click on it
you will see that it gets disabled, and there's some delay until the
process is effectively stopped, you can check it because the throbber
stopped spinning. When the scan is stopped, you can study the results
all that you want, but if you want to start another scan you will
need to clear the current results and start over. For this, you'll
use again the same button as before, but note that it is called
<I>Clear</I> now.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_434411c8.png" NAME="graphics11" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=74 HEIGHT=115 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
second button to control the process is the <I>Pause</I> one. It will
be enabled only when the process is running, and if you click on it,
it will be pressed down (and the process paused) until you click on
it again. Note that if you pause the process you can not cancel it
until you restart it.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">When
the scanning process is started, the system will switch automatically
to the <I>Log</I> tab. In this tab you can see how the scan evolves
through the different indicators.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">This
tab has two main sections. In the upper part you have the logging
text, where you can see all the information generated by the system.
In the principal section of that part [1] you can see all the
messages generated by the system, from the first one to the last
generated. As this log is normally a large quantity of text, you can
enable and disable the different type of messages, using the
checkboxes in the log bar [4]. Note that these different types have
different colors in the text itself. In the same bar you have a
<I>Search</I> button, which enables the search functionality
(explained in detail below).</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Also,
below that messages you can see exactly what the system is currently
doing, through a single line message [2].</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_4809e930.png" NAME="graphics12" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=605 HEIGHT=354 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">In
the lower part of the window you can see a graph that represents what
is going on with the scanning process in a visual way. In the <I>x
axis</I> you can see the time (automatically rescaled), and in the <I>y
axis</I> you can find three indicators: a grey bar which height
indicates the quantity of debug messages at that time, a blue dot if
there're information messages, and a vertical red bar with the
quantity of vulnerabilities found there.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_m5b06553e.png" NAME="graphics13" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=179 HEIGHT=39 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">All
this information is updated in real time. For a better visual
following of the process, you also have, at the right of the toolbar,
three indicators showing the quantity of information items found, of
vulnerabilities found, and the shell which were successfully
exploited (you'll find more information about this <I>Shells</I> in
the <I>Exploit</I> section of this document).</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Sometimes
the log information is too much, even if you can separate it in the
different message types, so there's a search functionality to help
you. You can open the <I>search bar</I> using the previously
mentioned button, or pressing CTRL-F when the log text window is in
focus.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">When
the search bar opens, you'll see a text entry where you can write
what you want to find, a <I>Next</I> and <I>Previous</I> buttons, and
a <I>Match case </I>checkbox:</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_m60e54cd5.png" NAME="graphics14" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=606 HEIGHT=171 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
system will find what you write in the text entry in real time,
taking the letter case in consideration if the <I>Match case</I>
checkbox is selected. If the inserted text doesn't match with
anything in the whole text, the entry background will turn red.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Also
in real time the matching text will be highlighted in yellow. If you
hit the <I>Next</I> or <I>Previous</I> buttons, the system will walk
the matching texts.</FONT></P>
<OL START=4>
<LI><H2 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Analyzing_the_results"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Analyzing the results</FONT></H2>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">You
can explore and analyze the scanning results after the scan process
is completed (or before it's finished, because the system let's you
work concurrently with that process). In this section I'll explain
the different windows you have to work with the results.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">There's
a complete tab for results in w3af, and as there're a lot of
information to analyze, this tab is also divided in tabs, as you can
check the Knowledge Base, see the site structure, or navigate through
the individual requests and responses.</FONT></P>
<OL>
<OL>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Browsing_the_Knowledge_Base"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Browsing the Knowledge
Base</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
Knowledge Base is a collection of discovered items, that can be
classified in Vulnerabilities, Informations, and other stuff. The <I>KB
Browser tab</I> lets you dive into this information.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">In
the left part of the window [1] you'll find the information of the
Knowledge Base. By default it only shows you the vulnerabilities and
informations, but you can enable also the miscellaneous stuff or hide
any of them, using the checkboxes above the info [2].</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
information is grouped in a tree way, but you have different nodes to
expand. If you select one of the items, and that item corresponds to
a HTTP request originated by the scanning, you will see in the right
part of the window all the information about that request and its
response (more info about this below).</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
items in the tree has a color that indicates the severity of the
issue: black for informations, orange for low-severity
vulnerabilities, and red for medium or high severity ones. As they're
in a tree structure, each node in the tree will have the color of the
more severe of its children.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_52654ed2.png" NAME="gráficos1" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=563 HEIGHT=319 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">As
said above, when you click on a tree node that actually is generated
by a HTTP request, you can see in the left part of the window
information about this request and its response. This part is
separated in different panes.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Above
everything [3] you have general information about when the request
was found (actually, this is the same line that you can find in the
logs regarding this request). Below that info you have the request
headers [4], the request body [5], the response headers [6], and the
response body [7].</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">At the bottom
[8] you have some buttons that will enable you to make some actions
with the request and response. With the buttons at the left you can
send the HTTP Request to the Manua<FONT FACE="Bitstream Vera Sans, sans-serif">l
and Fuzzy Request tools. With the button at the right you can send
everything to the Compare tool. These buttons refer to the same tools
that have the same icon in the toolbar, but actually send the shown
information to that tools, which is very handy.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">This
structure, the HTTP request and response with both panes each, and
the buttons to use that information w</FONT>ith other tools, is
repeated all over the program interface, so it's good to get used to
it.</P>
<OL>
<OL START=2>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Site_structure"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Site structure</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
<I>URLs tab</I> shows the structure of the site that the system
worked on. It's separated In two parts, but both parts show actually
the same information, although they show it in different ways.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_490ccf4d.png" NAME="gráficos2" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=375 HEIGHT=255 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">At
the left [1] you can see the site structure in the old fashion way:
with a tree-like list of nodes.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">At
the right [2] you have the same information but graphically. Above
the drawing [3] you have different buttons that help you to see the
graph better: zoom in, zoom out, fit all the graph in the window, and
show the graph in the original size.</FONT></P>
<OL>
<OL START=3>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Requests_and_Responses"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Requests and Responses</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">In
this window you will be able to search for any request (and the
associated response) that the system had generated during the
scanning.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_5df47c66.png" NAME="graphics15" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=329 HEIGHT=183 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">In
the upper text entry [1] you can insert a query to search the
knowledge database for requests and responses. You have a flexible
syntax to build your query, for details about the syntax, click on
the <I>Help</I> button on the right, and a similar window to the one
shown here will be presented to you.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">After
you enter the query, and hit the Find button, the system will
retrieve all the requests and responses that match, and will present
them to you in the results list [2]. If you click on any of those
results, you'll see the request and response details [3].</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_m2de7cfe6.png" NAME="graphics16" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=568 HEIGHT=257 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">As
usual when seeing requests and responses, you'll have the tool
buttons [4] to use these data in the already familiar tools.</FONT></P>
<OL START=5>
<LI><H2 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Exploitation"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Exploitation</FONT></H2>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">In
this section I'll explain you how to exploit the vulnerabilities
found. </FONT>
</P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">When
the scan is running or after the scan finished running, as you can
check the results, you also can start with the exploitation. For
this, go to the fourth tab in the system, called <I>Exploit</I><SPAN STYLE="font-style: normal"><SPAN STYLE="text-decoration: none">:</SPAN></SPAN></FONT></P>
<IMG SRC="gtkUiUsersGuide_html_4efa8b8b.png" NAME="graphics17" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=575 HEIGHT=342 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">This
window is separated in different panes. At the very left [1] you
have a list of all the exploits that you can execute over the
vulnerabilities that you found, which are listed in the second column
[2]. You can see there that we found three vulnerabilities, as you
can also check in the left bottom corner of the window [3]. </FONT>
</P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">At
the right part of the window, there're two panes: one [4] for the
exploited shells (more on this below), and one [5] for the proxies
(this functionality is not yet developed).</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Finally,
you can see that when you enter to this tab, the <I>Multiple Exploit
</I>button in the toolbar [6] is enabled.</FONT></P>
<OL>
<OL>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Executing_an_exploit"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Executing an exploit</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">Exploits act on
vulnerabilities. But not all exploits act on every vulnerabilities.
It is well known if any exploit could act on some vulnerability,
though, but to be sure and actually<FONT FACE="Bitstream Vera Sans, sans-serif">
exploit it some verification needs to be done. Fortunately, the
system easies very much this process to you.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">To
exploit a vulnerability, you need to drag the exploit and drop it on
the vulnerability you want to exploit. This drag & drop process
is all you need to activate one specific exploit; if you want
multiple exploiting see below. But, as all exploits don't act on all
vulnerabilities, how do you know what to drag and drop where?</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">When
you click on any exploit, the system will put in bold font those
vulnerabilities that <I>could</I> be exploited by that exploit [1].
This works also in the other way: if you click on any vulnerability,
the system will put in bold those exploits that <I>could</I> act on
that vulnerability [2]. I put emphasis on the “could”, because
there's no certainty that the match will be useful... but for sure,
if you trigger an exploit over a vulnerability that don't have both
fonts in bold, it will not act.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_m529b81c5.png" NAME="graphics18" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=560 HEIGHT=304 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">On
the other hand, if you actually drag a marked exploit on a marked
vulnerability, the system will try to exploit it. A new window will
pop up [3], showing the actions that the system is taken. See in the
example that the system first checks the suitability of that exploit
over that vulnerability, and if OK, it actually triggers the exploit.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_7254acf5.png" NAME="graphics19" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=159 HEIGHT=257 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">In
the example, everything is fine and the exploit succeeds, creating a
Shell in the shell window [4].</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">If
you want to trigger more than one exploit at once, you should click
on the <I>Multiple Exploit</I> button in the toolbar, and a window
like the one here at the right will appear. There you can select all
the exploits that you want to trigger, and when you click on the
<I>Execute</I> button, the system will try all the marked exploits on
all the possible vulnerabilities. If you activate the <I>First
successful </I>checkbox, the system will stop after the first time
that an exploit succeeds when working on any vulnerability.</FONT></P>
<OL>
<OL START=2>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Using_a_shell"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Using a shell</FONT></H3>
</OL>
</OL>
<IMG SRC="gtkUiUsersGuide_html_744f5eda.png" NAME="gráficos3" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=268 HEIGHT=224 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">If
the vulnerability generates a Shell as the result of being exploited,
you will see the shell (or shells if it generates more than one)
appear in a pane of this window, as we saw above.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">If
you double click on that shell, you will start using it, and a new
window will pop up for you to use it, a window very similar to the
one you see here at the right.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">There
you can see that you have a shell like environment. Well, it is
exactly that: it is the shell opened in the remote equipment as a
result of the exploited vulnerability. </FONT>
</P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Also,
you have a <I>Save</I> button that let you save all the session to a
file, in the case you want to keep all the text for a later analysis.</FONT></P>
<OL START=6>
<LI><H2 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Other_tools"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Other tools</FONT></H2>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Apart
from the w3af core functionality, that is to scan for vulnerabilities
and exploit them, there are other tools that help you in the day by
day work.</FONT></P>
<OL>
<OL>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Manual_Requests"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Manual Requests</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">This tool lets
you generate <FONT FACE="Bitstream Vera Sans, sans-serif">manual HTTP
requests.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_m3291ea61.png" NAME="graphics20" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=514 HEIGHT=254 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">When <FONT FACE="Bitstream Vera Sans, sans-serif">opening
the tool you will find the typical four panes window for HTTP
requests and responses. In this case you'll find only active the
request part [1], filled with an example request (if you opened this
tool from the toolbar) or with a request that you may brought from
another part of the program (using the small button under other
requests, as is explained above).</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">You
can edit the request, not only the headers part but also the body of
the HTTP request, an</FONT>d when ready, click on the <I>Send</I>
button [2] to issue that manually crafted request. Note that you can
check the <I>Fix length header </I>button if you want the system to
correct the Length header in the request that is sending (which lets
you modify the request without fixing that header every time).</P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
system will issue the request and put the response (headers and body)
in the right part [4].</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Also
you have the normal <I>send data to tools</I> buttons in the usual
places [5].</FONT></P>
<OL>
<OL START=2>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Fuzzy_Requests"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Fuzzy Requests</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">This
tool lets you create multiple manual requests in an easy and
controllable way. </FONT>
</P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
part of building the HTTP request is pretty similar to the manual
request, as you have also panes for the headers and the body [1], but
using a special syntax you can create what is called a <I>Fuzzy
Request</I>, which is actually a request that is expanded to multiple
ones. You have a quick helper for this syntax in that very window
[2], but here it is explained in detail.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">When
you create a request, all the text is sent as is to the destination,
except those that are inside two dollar signs (<I>$</I>). This text
is used by the system to create a text generator, that it will
consumed creating the multiple requests (they're called <I>fuzzy
generators</I>). If you don't put any double dollar signs, it will be
exactly the same as if you used the <I>Manual Request </I>tool. If
you actually want to include a dollar sign in the request, just use
<I>\$</I>.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">But
if you put a text between two dollar signs that generates <I>three</I>
items, you will actually creating <I>three</I> requests, and you will
get <I>three</I> responses at the right. You can put as many fuzzy
generators as you want, and the system will create multiple requests
using all the possible combinations. So, if you keep the first
generator (that generated three items), and insert a new one that
generates, say, five items, the system will create fifteen requests
(3 x 5 = 15).</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
system will generate the different items using the text between the
dollar signs as a Python statement, using directly <I>eval()</I>,
with an almost clean namespace (there's only the already imported
<I>string</I> module). There's no security mechanism in this
evaluation, but there's no risks as the evaluated text is only
between the dollar signs, and you're responsible about that.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Using
this evaluation, for example, you could do:</FONT></P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Numbers
from 0 to 4: <FONT FACE="Bitstream Vera Sans Mono, sans-serif">$range(5)$</FONT></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>First ten
letters: <FONT FACE="Bitstream Vera Sans Mono, sans-serif">$string.lowercase[:10]$</FONT></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>The words
<I>spam</I> and <I>eggs</I>: <FONT FACE="Bitstream Vera Sans Mono, sans-serif">$['spam',
'eggs']$</FONT></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>The
content of a file: <FONT FACE="Bitstream Vera Sans Mono, sans-serif">$[l.strip()
for l in file('input.txt')]$</FONT></P>
</UL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">You
can actually check how many request the system will generate, using
the <I>Analyze </I>button [3]. Just clicking on it the indicator at
its right will be updated to this value. Also, if you check the
<I>Preview</I> checkbox [4], the system will generate the different
requests, and will show you them in a new pop up window.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_69079678.png" NAME="graphics21" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=595 HEIGHT=314 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">When
you're ready to actually send the generated requests, you can use the
<I>Play</I> and <I>Stop</I> buttons [5], which will let you start,
stop, and even pause the generated requests of being sent (the <I>Play</I>
button will mutate to a <I>Pause</I> one when the system is sending
the requests). Also, another indicator that the system is working is
the throbber [6].</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
system will show all the responses (even as they're being generated)
in the classic four pane arrangement [7]: the request that was
actually sent (not the fuzzy request, but one of the generated ones,
with the text between the <I>$</I> replaced), and the response to
that specific request. Of course, the system will not show you all
the requests at once, but you have a control [8] that lets you see
any of the generated request/response (using the arrows, or you're
even able to just enter the number that you want to see).</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_m14d55490.png" NAME="graphics22" ALIGN=LEFT HSPACE=18 VSPACE=18 WIDTH=255 HEIGHT=263 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Beyond
the standard tool buttons [9] to send the request and/or response to
the Manual Request tool or the Compare tool, you have a <I>Clear
Responses </I>button [A] that will erase all the results, and a
<I>Cluster Responses</I> one [B] that will send all the responses to
the <I>Cluster</I> tool (note that this tool is only accessible
through here, as it only has sense to use it from multiple generated
responses).</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="ClusterResponseTool"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">The Cluster Responses
tool lets you analyze all the responses seeing graphically how
different they're between themselves. The graph will show you the
responses, and the distance between them, grouping for a better
analysis.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Also
you have different buttons that help you to see the graph better:
zoom in, zoom out, fit all the graph in the window, and show the
graph in the original size.</FONT></P>
<OL>
<OL START=3>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Encode_and_Decode"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Encode and Decode</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">This
tool allows you to apply a lot of encoding and decoding functions in
the text that you want.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_m368527fb.png" NAME="graphics23" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=437 HEIGHT=194 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">You
have two panes where you can insert the text you want; put the text
to Encode in the upper pane [1], and when encoded it will appear in
the lower pane [2], and viceversa: to decode something put the text
in the lower pane and after decoding it will appear in the upper
pane.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">To
apply an encode, choose it from the encoding functions [3], and click
on the <I>Encode</I> button. To apply a decode, choose it from the
decoding functions [4], and click on the <I>Decode</I> button.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">You
have the following encoding and decoding functions:</FONT></P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>0xFFFF
Encoding: 0x encoding method</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Base64
Encode / Decode: Encode and decode using <I>Base64</I></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Double
Nibble Hex Encoding: This is based on the standard hex encoding
method. Each hexadecimal nibble value is encoded using the standard
hex encoding</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Double
Percent Hex Encoding: This is based on the normal method of hex
encoding. The percent is encoded using hex encoding followed by the
hexadecimal byte value to be encoded</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Double URL
Encode / Decode: Encode and decode doing <I>Double URL Encode</I></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>First
Nibble Hex Encoding: This is very similar to double nibble hex
encoding. The difference is that only the first nibble is encoded</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>HTML
Escape / Unescape: Encode and decode doing <I>HTML escaping</I></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Hex
Encoding / Decoding: This is one of the RFC compliant ways for
encoding a URL. It is also the simplest method of encoding a URL.
The encoding method consists of escaping a hexadecimal byte value
for the encoded character with a <I>%</I></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>MD5 Hash:
Encode using <I>MD5</I></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>MS SQL
Encode: Convert the text to a CHAR-like MS SQL command</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Microsoft
%U Encoding: This presents a different way to encode Unicode code
point values up to 65535 (or two bytes). The format is simple; %U
precedes 4 hexadecimal nibble values that represent the Unicode code
point value</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>MySQL
Encode: Convert the text to a CHAR-like MySQL command</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Random
Lowercase: Change random chars of the string to lower case</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Random
Uppercase: Change random chars of the string to upper case</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>SHA1 Hash:
Encode using <I>SHA1</I></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>Second
Nibble Hex Encoding: This is very similar to double nibble hex
encoding. The difference is that only the second nibble is encoded</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>URL Encode
/ Decode: Encode and decode doing <I>URL Encode</I></P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>UTF-8
Barebyte Encoding: Just a normal <I>UTF-8</I> encoding</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>UTF-8
Encoding: Just that. Note that the hexadecimal values are shown with
a <I>%</I></P>
</UL>
<OL>
<OL START=4>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Comparing_HTTP_traffic"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Comparing HTTP traffic</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">With
this tool you will be able to compare different requests and
responses. </FONT>
</P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
Comparator window is separated mainly in two panes: both request and
responses that you're comparing. In this tool all the information is
concatenated in the same text, to ease the comparison, but you have
four buttons [1] to control which part of the information appear in
the text: request headers, request body, response headers, and
response body.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
comparison itself is done between the request/response at the left
[2], and whatever request/response you have at the right [3]. This
tool is prepared to handle more than two requests/responses: you
always will have one request/response at the left, and all the
requests/responses that you added at the right. To see exactly what
you're comparing, the system shows you each Id [4].</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_3b3360d1.png" NAME="graphics24" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=606 HEIGHT=286 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">You
have a control [5] to select which of the requests/responses that you
added will compare to the one at the right. If you want to change the
request/response that is at the left (the one that you compare to),
you can set it using the <I>Set text to compare</I> button [6]. You
can delete any of the requests/responses at the right using the
<I>Delete</I> button [7], or delete them all with the <I>Clear All
</I>one [8].</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
requests can also sent from this tool to the <I>Manual Requests</I>
or <I>Fuzzy Requests</I> ones, using the buttons above the texts [9].
There's also a button [A] to send all the responses at the right to
the <I>Cluster Responses</I> tool.</FONT></P>
<OL>
<OL START=5>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Using_the_Proxy"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Using the Proxy</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">This tool is a
<FONT FACE="Bitstream Vera Sans, sans-serif">proxy that listen to a
port in the machine you're running the </FONT><FONT FACE="Bitstream Vera Sans, sans-serif">w3af
program. You can configure any program that issues HTTP request (like
your internet browser, for example) to use this proxy.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">When
this other program issues the request, the proxy captures it and
shows it to you [1]. You can choose to drop this request, using the
<I>Drop</I> button [2], or let the request continue. If you choose
the latter, you can edit the request as you want, and then click on
the <I>Send</I> button [3].</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_715eb766.png" NAME="graphics25" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=487 HEIGHT=341 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">So
the system will send the request, and catch the response when
arrives, and will show it to you at the right pane [4]. After
analyzing the response, you can click on the <I>Next </I>button [5],
and the system will pass the response to the other program, and
prepare itself to catch the next HTTP request.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">As
usual when working with HTTP requests and responses you have some
buttons [6] to send that information to other tools. Also you have a
<I>History</I> pane [7] that let you search on all the requests and
responses (for help about this window, check chapter 4.3 on this
documentation, as it's the very same interface).</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">In
the toolbar [8] of this window you have a </FONT>Activate<FONT FACE="Bitstream Vera Sans, sans-serif">
button that controls if the proxy is activated or not, a </FONT>Trap
Request<FONT FACE="Bitstream Vera Sans, sans-serif"> button that will
determine if the proxy is letting the request pass through without
the procedure explained above, and a </FONT>Configuration<FONT FACE="Bitstream Vera Sans, sans-serif">
button (see chapter 7.4 for help about this configuration).</FONT></P>
<OL>
<OL START=6>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Wizards"></A><A NAME="Comparing_HTTP_traffic1"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Wizards</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">The
wizard is a collection of easy questions that you need to answer, and
using all this information, the system will generate a Profile for
you. Easy as that.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">When
you click on the <I>Wizard</I> button in the toolbar, or choose the
same option in the <I>Help</I> menu, a new pop up window will appear.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">This
first window will just let you choose which Wizard you want to run.
Choose one, and click on the <I>Run the wizard </I>button.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">After
this initial window, you'll be presented all the questions that need
to answer to feed the wizard. In each window you'll have a
description of the needed information, one or more questions or
fields to fill, and the <I>Back</I> and <I>Next </I>buttons.</FONT></P>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">You
can go back and forward through all the wizard, but at the very end
you'll want the Wizard to execute its magic, and generate the profile
for you. For this, in the last window you'll have two fields: the
name and the description of the new profile. Fill them, click on the
<I>Save</I> button, and that's all: you have a new profile in the
system.</FONT></P>
<OL START=7>
<LI><H2 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Configurations"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Configurations</FONT></H2>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">There're
different configuration panels all across the w3af system. Here all
of them are explained.</FONT></P>
<OL>
<OL>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="HTTP_Configuration"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">HTTP Configuration</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">This
section is used to configure URL settings that affect the core and
all plugins.</FONT></P>
<IMG SRC="gtkUiUsersGuide_html_m786b396b.png" NAME="graphics26" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=463 HEIGHT=151 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">General
configuration:</FONT></P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>timeout:
The timeout for connections to the HTTP server. Set low timeouts for
LAN use and high timeouts for slow Internet connections.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY><FONT FACE="Bitstream Vera Sans, sans-serif">headersFile:
Set the headers filename. This file has additi</FONT>onal headers
that are added to each request.</P>
</UL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Basic
HTTP Authentication:</FONT></P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>basicAuthUser:
Set the basic authentication username for HTTP requests.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>basicAuthPass:
Set the basic authentication password for HTTP requests.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>basicAuthDomain:
Set the basic authentication domain for HTTP requests. This
configures on which requests to send the authentication settings
configured in basicAuthPass and basicAuthUser. If you are unsure,
just set it to the target domain name.</P>
</UL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Cookies:</FONT></P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>cookieJarFile:
Set the cookiejar filename. The cookiejar file must be in mozilla
format.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>ignoreSessCookies:
Ignore session cookies. If set to True, w3af will ignore all session
cookies sent by the web application.</P>
</UL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Outgoing
proxy:</FONT></P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>proxyPort:
Proxy TCP port TCP port for the remote proxy server to use. On
windows systems, if you left this setting blank w3af will use the
system settings that are configured in Internet Explorer.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>proxyAddress:
Proxy IP address IP address for the remote proxy server to use. On
windows systems, if you left this setting blank w3af will use the
system settings that are configured in Internet Explorer.</P>
</UL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><FONT FACE="Bitstream Vera Sans, sans-serif">Misc:</FONT></P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>userAgent:
User Agent header. User Agent header to send in request.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>maxFileSize:
Maximum file size. Indicates the maximum file size (in bytes) that
w3af will GET/POST.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>maxRetrys:
Maximum number of retries. Indicates the maximum number of retries
when requesting an URL.</P>
</UL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">404 settings:</P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>always404:
A comma separated list that determines what URLs will ALWAYS be
detected as 404 pages.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>404exceptions:
A comma separated list that determines what URLs will NEVER be
detected as 404 pages.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>autodetect404:
Perform 404 page autodetection.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>byDirectory404:
Perform 404 page detection based on the knowledge found in the
directory of the file. Only used when autoDetect404 is False.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>byDirectoryAndExtension404:
Perform 404 page detection based on the knowledge found in the
directory of the file AND the file extension. Only used when
autoDetect404 and byDirectory404 are False.</P>
</UL>
<OL>
<OL START=2>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Miscellaneous_Configuration"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Miscellaneous
Configuration</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">This section is
used to configure misc settings that affect the core and all plugins.</P>
<IMG SRC="gtkUiUsersGuide_html_m1578427e.png" NAME="graphics27" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=454 HEIGHT=163 BORDER=0><BR CLEAR=LEFT>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">Fuzzer
parameters:</P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>fuzzCookie:
Indicates if w3af plugins will use cookies as a fuzzable parameter.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>fuzzFileContent:
Indicates if w3af plugins will send the fuzzed payload to the file
forms.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>fuzzFileName:
Indicates if w3af plugins will send fuzzed filenames in order to
find vulnerabilities. For example, if the discovered URL is
http://test/filename.php, and fuzzFileName is enabled, w3af will
request among other things: http://test/file'a'a'name.php in order
to find SQL injections. This type of vulns are getting more common
every day!</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>fuzzFCExt:
Indicates the extension to use when fuzzing file content.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>fuzzableHeaders:
A list with all fuzzable header names.</P>
</UL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">Core parameters:</P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>autoDependencies:
Automatic dependency enabling for plugins. If autoDependencies is
enabled, and pluginA depends on pluginB that wasn't enabled, then
pluginB is automatically enabled.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>maxDepth:
Maximum depth of the discovery phase. For example, if set to 10, the
webSpider plugin will only follow 10 link levels while spidering the
site. This applies to the whole discovery phase; not only to the
webSpider.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>maxThreads:
Maximum number of threads that the w3af process will spawn.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>maxDiscoveryLoops:
Maximum number of times the discovery function is called.</P>
</UL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">Network
parameters:</P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>interface:
Local interface name to use when sniffing, doing reverse
connections, etc.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>localAddress:
Local IP address to use when doing reverse connections.</P>
</UL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">Misc:</P>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>demo:
Enable this when you are doing a demo in a conference.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>showProgressBar:
Enables or disables the progress bar that is shown by audit plugins.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>nonTargets:
A comma separated list of URLs that w3af should completely ignore.
Sometimes it's a good idea to ignore some URLs and test them
manually.</P>
</UL>
<OL>
<OL START=3>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Advanced_target"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Advanced target</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">Configure target
URLs.</P>
<IMG SRC="gtkUiUsersGuide_html_m40b18f70.png" NAME="graphics28" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=426 HEIGHT=103 BORDER=0><BR CLEAR=LEFT>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>target:
A comma separated list of URLs</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>targetOS:
Target operating system. This setting is here to enhance w3af
performance.</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>targetFramework:
Target programming framework. This setting is here to enhance w3af
performance.</P>
</UL>
<OL>
<OL START=4>
<LI><H3 CLASS="western" STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm"><A NAME="Proxy_Configuration"></A>
<FONT FACE="Bitstream Vera Sans, sans-serif">Proxy Configuration</FONT></H3>
</OL>
</OL>
<P STYLE="margin-top: 0.42cm; margin-bottom: 0.21cm">These are the
options to configure the Proxy tool.</P>
<IMG SRC="gtkUiUsersGuide_html_m81acf4d.png" NAME="graphics29" ALIGN=LEFT HSPACE=18 VSPACE=7 WIDTH=424 HEIGHT=121 BORDER=0><BR CLEAR=LEFT>
<UL>
<LI VALUE=1><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>ignoreimgs:
Ignore images by extension</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>ipport: IP
and port where to listen</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>trap:
REGEX that indicates what URL to trap</P>
<LI><P CLASS="cuerpo-de-texto-con-sangría" ALIGN=JUSTIFY>fixlength:
Fix content length</P>
</UL>
</BODY>
</HTML>
|