Andres,
If the framework IS working like this, I think that the shared fuzzable request list wouldn't do much good. If it is not working like this (and I would love to get an output log to show it), it seems that we have a lot of work ahead of us.And w3afCore need to filter requests from discovery plugins on every loop in _discover_and_bruteforce(), am I right?It should filter things as they come out of the plugin and before adding them to the fuzzable request list,
Agree, but as I see in w3afCore.py there is no filtering in it.I just have added it [0]. It shows good results on the test suite (see attachment).
Without filtering: Found 2 URLs and 87 different points of injection. ... Scan finished in 3 minutes 30 seconds. With filtering: Found 2 URLs and 3 different points of injection. ... Scan finished in 11 seconds.
Please let me know if the discovery process is NOT working as we expect and if we have to filter stuff somewhere
See above. [0] https://sourceforge.net/apps/trac/w3af/changeset/4861 -- Taras http://oxdef.info
spider_www.tar.gz
Description: application/gzip
[profile] description = Pentest name = Pentest [target] target = http://localhost/spider/ [output.console] verbose = False [output.textFile] verbose = False fileName = output.txt httpFileName = output-http.txt [misc-settings] fuzzCookie = False fuzzFileContent = false fuzzFileName = False fuzzFCExt = txt fuzzableHeaders = autoDependencies = True maxDiscoveryTime = 1 maxThreads = 0 interface = lo localAddress = 127.0.0.1 demo = False nonTargets = exportFuzzableRequests = fuzzFormComboValues = t msf_location = /opt/metasploit3/bin/ fuzzURLParts = True [http-settings] timeout = 3 headersFile = basicAuthUser = basicAuthPass = basicAuthDomain = ntlmAuthUser = ntlmAuthPass = ntlmAuthURL = cookieJarFile = ignoreSessCookies = False proxyPort = 8080 proxyAddress = userAgent = Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0) maxFileSize = 400000 maxRetrys = 1 always404 = never404 = 404string = urlParameter = [audit.xss] [audit.osCommanding] [audit.sqli] [audit.globalRedirect] [audit.responseSplitting] [discovery.webSpider] onlyForward = True followRegex = .* ignoreRegex =
------------------------------------------------------------------------------ Better than sec? Nothing is better than sec when it comes to monitoring Big Data applications. Try Boundary one-second resolution app monitoring today. Free. http://p.sf.net/sfu/Boundary-dev2dev
_______________________________________________ W3af-develop mailing list W3af-develop@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/w3af-develop