Hi Philip

Btw you can specify a ingoreRegex for the webSpider if you just
want to ignore some URIs.

It would be great if you can open a ticket [0] if you really
find a bug in the newest svn release that isn't yet in our
trac system.

[0] https://sourceforge.net/apps/trac/w3af/newticket

cheers
floyd

 -----
http://www.floyd.ch



----- Ursprüngliche Mail ----
Von: philip hartlieb <philip.hartl...@us.army.mil>
An: Floyd Fuh <floyd_...@yahoo.de>
CC: w3af-users@lists.sourceforge.net
Gesendet: Donnerstag, den 4. November 2010, 14:07:31 Uhr
Betreff: Re: [W3af-users] scoping a scan

Hi Floyd,

Thank you for the feedback!

I think this answers my question.  My approach is imperfect, but will not 
result 
in an epic fail with regard to results. That is, it *is* acceptable to feed the 
audit and/or grep plugins a list of fuzzable requests from a file rather than 
from a "runaway" discovery process. 


The ImportResults and "export fuzaable requests" feature will make life much 
easier.  Thanks for the heads up.

For the record, I have identified the URIs that blow my scan times up to 3+ 
days.   Whether I fed it the URIs to audit.xss in small batches or allowed the 
discovery plugin to do it for me appears to have been irrelevant.   The Drupal 
search components choke the tool for days.  I need to find out why.

Thanks again,

VR

-pjh 

On Nov 4, 2010, at 4:15 AM, Floyd Fuh wrote:

> Hi Philip
> 
> Looks like your page is huge (or as you said w3af doesn't stop crawling).
> 
> Because you're running on Fedora, I assume you're using python 2.6 or 2.7.
> W3af is *officially* only supported in python 2.5. But in my experience it
> runs under 2.6 (but I guarantee for nothing). Never tried 2.7.
> 
> In your situation I suggest you do the scan in two steps:
> 1. discovery
> 2. audit
> 
> For phase 1 I suggest you update to at least revision 3656. From that
> version the "export fuzzable requests" feature was fixed. Phase 1:
> 1. enable some discovery plugins (try first with just webSpider), no other 
> plugins
> 2. Go to Configuration - Misc
> 3. Go to Core Settings and change the maxDiscoveryTime to your needs
> 4. Go to Export Fuzzable Request and type in where you want to save the CSV
> 5. Start w3af as usual
> 6. Copy the CSV to somewhere else (to make sure it won't get overwritten in 
> phase 2)
> 7. Remove duplicate URIs and add if some are missing
> 
> For phase 2:
> 1. enable only the importResults discover plugin and specify the path to the 
>CSV
> 2. enable the audit/grep plugins you wish to run (btw you don't need the 
> frontpage plugin when
> you test a Drupal installation...)
> 3. run the scan
> 
> Of course you can redo phase 2 with other plugins.
> 
> About your questions: Of course it is always possible to miss vulnerabilities 
> (like xss). No
> tool is perfect. If you really want to do a lot of XSS tests you might want 
> to 

> set numberOfChecks
> to 15 inside the xss plugin. 
> 
> cheers
> floyd
> 
> -----
> http://www.floyd.ch
> 
> 
> 
> ----- Ursprüngliche Mail ----
> Von: philip hartlieb <philip.hartl...@us.army.mil>
> An: w3af-users@lists.sourceforge.net
> Gesendet: Mittwoch, den 3. November 2010, 16:17:56 Uhr
> Betreff: [W3af-users] scoping a scan
> 
> Hello:
> 
> I'm hoping to get some feedback on the following issue.
> 
> Background
> We are running the following:
> - w3af revision 3623
> - w3af host:  Fedora core <<2.6.33.3-85.fc13.i686.PAE>>
> - target: custom drupal installation with end user data
> 
> Objective:
> - I would like to bring back data for the OWASP-top-10 discovery and audit 
> plugins
> - discovery allowedMethods, content_negotiation, detectReverseProxy, 
> detectTransparentProxy, digitSum, dir_bruter, domain_dot, 
> favicon_identification, findBackdoor, fingerprint_os, hmap, phpEggs, phpinfo, 
> pykto, robotsReader, serverHeader, serverStatus, slash, urlFuzzer, 
> urllist_txt, 
>
> webSpider, wordnet, wsdlFinder
> - audit frontpage, eval, blindSqli, phishingVector, xsrf, mxInjection, 
> preg_replace, localFileInclude, LDAPi, osCommanding, ssi, sqli, buffOverflow, 
> xpath, generic, htaccessMethods, remoteFileInclude, responseSplitting, 
> formatString, globalRedirect, xst, xss, fileUpload 
> 
> 
> Approach:
> - To begin scoping the scan, I decided to keep it very simple and run 
> **only** 

> the WebSpider and xss plugins.  After 3+ days the scan had not completed.  
> This 
>
> was not tenable.
> - I then decided to run the owasp-top-10 discovery plugins only.  This scan 
> completed overnight and delivered 23,000 lines of output in the text file.  I 
> now had a data set to audit.
> - There were 20022 URIs reported. <<For the purposes of this email, I'm 
>assuming 
>
> a URI = https://this.is.our.site/go/to/this?name1=value1&name2=value2
> - However, I parsed through the output and discovered that there were only ~ 
>240 
>
> unique URIs **if** I ignore the differences in the parameter values.  The 
> presence of end user data seems to have ballooned the discovery results.
> - If I then batch these URIs into groups of ~ 25 and place them after the 
> "set 

> target" directive ***and** only run the xss audit plugin, I can get good 
>results 
>
> in about 3 hours for all 240 targets.
> 
> Questions:
> - I know that w3af is designed to work recursively in that the discovery  and 
> audit plugins work back and forth to discover new injection points and find 
> additional URIs/URLs.  Is is possible that I am missing true xss 
>vulnerabilities 
>
> by using the approach above?
> - I noticed that the XSS plugin **will** discover the allowed methods and 
> parameters for each URL you feed it.  If that's the case, then it would seem 
> that this is a legitimate way to scope the scan and save time as the xss 
> plugin 
>
> will be fuzzing all of the possible injection points?
> 
> thoughts?
> 
> 
> ----
> Philip J. Hartlieb (PhD.)
> GSLC / Security+
> Systems Engineer
> 
> "They would take their software out and race it in the black desert of the 
> electronic night."   -- Snow Crash
> 
> 
> 
> 
> ------------------------------------------------------------------------------
> Achieve Improved Network Security with IP and DNS Reputation.
> Defend against bad network traffic, including botnets, malware, 
> phishing sites, and compromised hosts - saving your company time, 
> money, and embarrassment.   Learn More! 
> http://p.sf.net/sfu/hpdev2dev-nov
> _______________________________________________
> W3af-users mailing list
> W3af-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/w3af-users
> 
> 
> 

----
Philip J. Hartlieb (PhD.)
GSLC / Security+
Systems Engineer
Space and Naval Warfare (SPAWAR) Systems Center - Atlantic

"They would take their software out and race it in the black desert of the 
electronic night."   -- Snow Crash




------------------------------------------------------------------------------
The Next 800 Companies to Lead America's Growth: New Video Whitepaper
David G. Thomson, author of the best-selling book "Blueprint to a 
Billion" shares his insights and actions to help propel your 
business during the next growth cycle. Listen Now!
http://p.sf.net/sfu/SAP-dev2dev
_______________________________________________
W3af-users mailing list
W3af-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-users




------------------------------------------------------------------------------
The Next 800 Companies to Lead America's Growth: New Video Whitepaper
David G. Thomson, author of the best-selling book "Blueprint to a 
Billion" shares his insights and actions to help propel your 
business during the next growth cycle. Listen Now!
http://p.sf.net/sfu/SAP-dev2dev
_______________________________________________
W3af-users mailing list
W3af-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to