Category:OWASP Wapiti Project

=Main=



{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 * valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |

OWASP Wapiti Project
Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.

Introduction
Web application vulnerability scanner / security auditor.

Description
Wapiti allows to audit the security of web applications in an easy way. It performs a "black-box" scans acting like a fuzzer, injecting payloads to see if an application is vulnerable. It has two principal parts, a crawler that explores the pages of the application and the attack module that injects the payloads and evaluates their responses. Wapiti is easy to use and it can detect the most common vulnerabilities (XSS, SQL Injection, File Handler Errors...). It provides to the user a complete report (html format) with the found vulnerabilities.

Licensing
OWASP Wapiti Project is free to use. It is licensed under the GNU Library or Lesser General Public License (LGPL).


 * valign="top" style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |

Project Leader
[mailto:nicolas.surribas@gmail.com Nicolas Surribas]

Openhub
https://www.openhub.net/p/wapiti


 * valign="top" style="padding-left:25px;width:200px;" |

Quick Download
Download the latest release here.

Email List
Sign Up!

Classifications

 * }

=FAQs=


 * What are the features?
 * Features


 * Fast and easy to use
 * Generates vulnerability reports in various formats (HTML, XML, JSON, TXT...)
 * Can suspend and resume a scan or an attack
 * Can give you colors in the terminal to highlight vulnerabilities
 * Different levels of verbosity
 * Adding a payload can be as easy as adding a line to a text file
 * Support HTTP and HTTPS proxies
 * Authentication via several methods : Basic, Digest, Kerberos or NTLM
 * Ability to restrain the scope of the scan (domain, folder, webpage)
 * Safeguards against scan endless-loops (max number of values for a parameter)
 * Can exclude some URLs of the scan and attacks (eg: logout URL)
 * Extract URLs from Flash SWF files
 * Try to extract URLs from javascript (very basic JS interpreter)
 * ... and more features described on the website !

= Acknowledgements =

Volunteers
Wapiti is developed by a worldwide team of volunteers. The primary contributors to date have been:


 * [mailto:apastorn@grupogesfor.com Alberto Pastor Nieto]


 * [mailto:dpozog@grupogesfor.com David del Pozo González]

Others
= Road Map and Getting Involved = As of July, the priorities are:
 * xxx
 * xxx
 * xxx

Involvement in the development and promotion of Wapiti is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
 * xxx
 * xxx

=Project About=