Automated Audit using W3AF

Last revision (mm/dd/yy): 04/27/2013

This type of article aims to provide to development team a easy/quick way to perform automated audit tests against their web application projects over implementation phase.

Description
This page have to objective to show a W3AF sample script to automate audit of a web application.

W3AF is a free and open source Web Application Attack and Audit Framework (W3AF homepage).

This script do not replace a manual audit but can be useful to perform a first validation.

Script content



 * 1)                                              W3AF AUDIT SCRIPT FOR WEB APPLICATION



http-settings set timeout 30 back misc-settings set max_discovery_time 20 set fuzz_cookies True set fuzz_form_files True set fuzz_url_parts True set fuzz_url_filenames True back plugins crawl web_spider crawl config web_spider set only_forward False set ignore_regex (?i)(logout|disconnect|signout|exit)+ back audit blind_sqli, buffer_overflow, cors_origin, csrf, eval, file_upload, ldapi, lfi, os_commanding, phishing_vector, redos, response_splitting, sqli, xpath, xss, xst audit config file_upload set extensions jsp,php,php2,php3,php4,php5,asp,aspx,pl,cfm,rb,py,sh,ksh,csh,bat,ps,exe back grep analyze_cookies, click_jacking, code_disclosure, cross_domain_js, csp, directory_indexing, dom_xss, error_500, error_pages, html_comments, objects, path_disclosure, private_ip, strange_headers, strange_http_codes, strange_parameters, strange_reason, url_session, xss_protection_header infrastructure server_header, server_status, domain_dot, dot_net_errors auth detailed auth config detailed set username admin set password password set method POST set auth_url http://pcdom/dvwa/login.php set username_field user set password_field pass set check_url http://pcdom/dvwa/index.php set check_string 'admin' set data_format username=%U&password=%P&Login=Login back output console, html_file output config html_file set output_file /tmp/W3afReport.html set verbose False back output config console set verbose False back back target set target http://pcdom/dvwa set target_os windows set target_framework php back cleanup start
 * 1) Configure HTTP settings
 * 1) Configure scanner global behaviors
 * 1) Configure entry point (CRAWLING) scanner
 * 1) Configure vulnerability scanners
 * 2) Specify list of AUDIT plugins type to use
 * 1) Customize behavior of each audit plugin when needed
 * 1) Specify list of GREP plugins type to use (grep plugin is a type of plugin that can find also vulnerabilities or informations disclosure)
 * 1) Specify list of INFRASTRUCTURE plugins type to use (infrastructure plugin is a type of plugin that can find informations disclosure)
 * 1) Configure target authentication
 * 1) Configure reporting in order to generate an HTML report
 * 1) Set target informations, do a cleanup and run the scan

Here the application Damn Vulnerable Web Application as been used as target application.

Script run
./w3af_console ­-s MyScript.w3af

After the script runs, the audit report is available in the location defined in clause "set fileName" ("/tmp/W3afReport.html" in the script example).

Script edition
In progress...