O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using W3af for vulnerability assessment

In this recipe, we will learn how to use W3af to find vulnerabilities within a target web application. W3af is a web application attack and audit framework. The project's goal is to create a framework to help you secure your web applications by finding and exploiting all web application vulnerabilities.

Getting ready

To step through this recipe, you will need Kali Linux running on Oracle Virtualbox and an Internet connection. No other prerequisites are required.

How to do it...

For this recipe, you need to perform the following steps:

  1. Open the terminal and type w3af_gui; the w3af window will be as shown in the following screenshot:

  2. Select the OWASP_TOP10 option from the profile selector in the left-hand side ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required