Andres Riancho wrote:
> Aaron,
> 
> On Thu, Apr 30, 2009 at 4:59 PM, Aaron Peterson
> <aa...@midnightresearch.com> wrote:
>> Hello:
>>
>> On Wed, Apr 29, 2009 at 08:20:47PM -0300, Andres Riancho wrote:
>>> On Wed, Apr 29, 2009 at 7:55 PM, Robert Carr <carr.m.rob...@gmail.com> 
>>> wrote:
>>>> 1. Iterative scans of a website
[snip]
>>>> have everything in a state file. (application settings, data)
>>> Ok,
>> Another unrelated note I have on the reporting front -- Something that would 
>> be
>> nice is to be able to have more control over filtering/combining report 
>> output.
>> One thing that might help would be to put a unique plugin id in each
>> vulnerability listed in the xml output file.  That way I could filter out an
>> entire plugin's output or more easily combine reports when needed.
>>
>> Speaking of this, is there any xslt or other way to transform the xml into a
>> html or text report?
> 
> In the rickybobby branch, Robert Carr is working on adding a unique
> numeric identifier to each vulnerability discovered by w3af. This will
> help you in the process of filtering, but it will take some time until
> he finishes up his work. If you want, you could send him an email and
> help him! =)

Something occurred to me when I read this bit.  Has anyone considered 
using the OWASP Testing Guide's identifiers? [1] I use the Testing Guide 
when I create reports since it gives a couple of benefits:
* Categories/structure already exists for almost anything you find
* Unique identifiers already exist
* Pre-made over-view descriptions to use in the report/output
* Online resource to point to for additional information

For example, a report I did yesterday included:
- - - -
Finding:  Exposed Session Variables (OWASP-SM-004)

Description:
The Session Tokens (Cookie, SessionID, Hidden Field), if exposed, will 
usually enable an attacker to impersonate a victim and access the 
application illegitimately. As such, it is important that they are 
protected from eavesdropping at all times – particularly whilst in 
transit between the Client browser and the application servers.

Details:
   (I wrote this bit)

Further Information:
http://www.owasp.org/index.php/Testing_for_Exposed_Session_Variables_(OWASP-SM-004)
(and some other links I added)
- - - -
Since the Testing Guide is creative commons share alike [2], all you 
have to  do is provide attribution and you're done. I only have to write 
the application specific details.  Version 3 of the guide was just 
published and it sure makes reporting suck less.

[1] http://www.owasp.org/index.php/OWASP_Testing_Guide_v3_Table_of_Contents
[2] http://creativecommons.org/licenses/by-sa/3.0/

-- Matt Tesauro
OWASP Live CD Project Lead
http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project
http://mtesauro.com/livecd/ - Documentation Wiki

> 
>>>> 4. Pausing a scan. I hate doing this, but sometimes you have to, especially
>>>> when you have very restrictive scan windows. With Burp, when you are
>>>> finished you can pick up where you left off and you have only one state
>>>> file, not 1 half finished and another full etc..
>>> I failed to understand this one,
>> Being able to pause a scan would definitely be nice (but I suspect it would
>> also require w3af sessions).  I have a site I'm working on now that only has 
>> a
>> 3 hour window per day that I can work on it.
> 
> Well... you could run w3af in a vmware, and pause the vmware ;) ;) ;) ;)
> 
>> HTH,
>>
>> Aaron
>>
> 
> 
> 

------------------------------------------------------------------------------
Register Now & Save for Velocity, the Web Performance & Operations 
Conference from O'Reilly Media. Velocity features a full day of 
expert-led, hands-on workshops and two days of sessions from industry 
leaders in dedicated Performance & Operations tracks. Use code vel09scf 
and Save an extra 15% before 5/3. http://p.sf.net/sfu/velocityconf
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to