Finding vulnerabilities with Wapiti
Wapiti is another terminal-based web vulnerability scanner, which sends GET
and POST
requests to target sites looking for the following vulnerabilities (http://wapiti.sourceforge.net/):
- File disclosure
- Database injection
- Cross-Site Scripting (XSS)
- Command execution detection
- CRLF injection
- XML External Entity (XXE) injection
- Use of known, potentially dangerous files
- Weak
.htaccess
configurations that can be bypassed - Presence of backup files that give sensitive information (source code disclosure)
In this recipe, we will use Wapiti to discover vulnerabilities in one of our test applications and generate a report of the scan.
How to do it...
Wapiti is a command-line tool; open a Terminal in Kali Linux and be sure you are running the vulnerable VM before starting:
- In the Terminal, execute
wapiti http://192.168.56.11/peruggia/ -o wapiti_result -f html -m "-blindsql"
to scan the Peruggia application in our vulnerable VM, save the output in HTML format inside thewapiti_result...