-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Taras,

On 08/10/2012 04:24 AM, Taras wrote:
> Andres,
> 
> It is interesting and in same time very painful step! Could you
> please describe it a little bit more? What was the reason and what
> advantages it will give?

The most important reason was to simplify the end user's configuration
of the framework. Having the different plugins separated helps the
user find stuff and config them properly.

Internally, at least for now, the crawl and infrastructure plugins are
handled the same.

> How much time do we have before next version of w3af will be
> released (I know that I talked a lot about it but stable releases
> are **very** important for enterprise using)?

When I finish [0], it will be released. If you're in a rush for that,
let me know and I'll tell you how you can help. I'm not spending any
time on the trunk version anymore, since its old/broken compared to
threading2. When threading2 is done, it will replace trunk.

[0] https://sourceforge.net/apps/trac/w3af/wiki/andres%27-TODO

>> Just wanted to let you guys know that I've removed the discovery 
>> plugin type, and instead we now have:
>> 
>> * crawl: all plugins that take a URL and return one or more URLs 
>> * infrastructure: all plugins that identify facts from the target
>> OS, HTTP daemon, etc. and do not return any URLs to the core.
>> 
>> While I'm in the process of breaking w3af in order to fix it for 
>> good; any other major changes you guys can think of?
> 


- -- 
Andrés Riancho
Project Leader at w3af - http://w3af.org/
Web Application Attack and Audit Framework
Twitter: @w3af
GPG: 0x93C344F3
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAlAk7sIACgkQLgy+VpPDRPNF8ACfYCV7PGuP7NxhXJSF5CuoSeTa
BjQAoMBuSRZ4IWUHIsp5ehNI8+K8Z15t
=aQjJ
-----END PGP SIGNATURE-----

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to