Also, just added a little bit more debugging for you, use the
feature/module branch of the w3af repository to run the scan. Instead
of a line like:

"The HTTP body for "http://192.168.92.135/dvwa/security.php"; could NOT
be parsed by lxml."

You should see something like:

"The HTTP body for "http://192.168.92.135/dvwa/security.php"; could NOT
be parsed by lxml. The exception was: "....""

Those dots will be replaced by the exception message.

On Sun, Aug 18, 2013 at 2:58 PM, Andres Riancho
<[email protected]> wrote:
> Just tried these two files really quick and I was able to parse them,
> at least with the way I used to reproduce it, w3af works.
>
> Lets try something different, could you capture the whole traffic of a
> w3af scan against that site and send me the pcap?
>
> Thanks!
>
> On Mon, Aug 12, 2013 at 11:29 PM, Shafeeque O.K [gmail]
> <[email protected]> wrote:
>> Hi Andres,
>>
>> Kindly find attached the files.
>>
>>
>> On Mon, Aug 12, 2013 at 7:00 PM, Andres Riancho <[email protected]>
>> wrote:
>>>
>>> It should be enough to wget them, yes.
>>>
>>> On Fri, Aug 9, 2013 at 9:45 AM, Shafeeque O.K [gmail]
>>> <[email protected]> wrote:
>>> > Is it ok, if I just do the following to get the files,  which was unable
>>> > tp
>>> > process by w3af..
>>> >
>>> > 1. wget http://192.168.92.135/dvwa/login.php
>>> > 2.  wget http://192.168.92.135/dvwa/security.php
>>> >
>>> > do I need to set any options for wget?
>>> >
>>> > Kindly guide.
>>> >
>>> >
>>> >
>>> > On Fri, Aug 9, 2013 at 12:41 AM, Andres Riancho
>>> > <[email protected]>
>>> > wrote:
>>> >>
>>> >> Shafeeque,
>>> >>
>>> >> On Thu, Aug 8, 2013 at 2:13 PM, Shafeeque O.K [gmail]
>>> >> <[email protected]> wrote:
>>> >> > Hi Andres,
>>> >> >
>>> >> > Thanks again for the instant reply.
>>> >> >
>>> >> >>>Item #2,3 - i will do some more investigation.
>>> >> >
>>> >> >>>  Typing in the shell. The cursor moment in the shell was not
>>> >> >>> smooth,
>>> >> >>> after typing a command, we need to press two enter to get a new
>>> >> >>> command
>>> >> >>> prompt. Some time I was keep hitting the enter key to get the
>>> >> >>> command
>>> >> >>> prompt
>>> >> >>> after completing a command.
>>> >>
>>> >> I understand, please report a bug for this.
>>> >>
>>> >> >>>For issue #530, I will try to give the php file :)
>>> >> >
>>> >> >> 6. I am wondering why SQLi in the DVWA is not detected eventhoough I
>>> >> >> gave
>>> >> >> the cookie file which is set the dvwa sceurity to low. With the same
>>> >> >> cookie
>>> >> >> details, SQLMap is detecting the SQLi in dvwa.
>>> >> >
>>> >> >>> The following is one among the request
>>> >> >
>>> >> > GET http://192.168.92.135/dvwa/vulnerabilities/sqli/?id=%3C%21--
>>> >> > HTTP/1.1
>>> >> > Referer: http://192.168.92.135/
>>> >> > Accept-encoding: gzip
>>> >> > User-agent: w3af.org
>>> >> > Host: 192.168.92.135
>>> >> > Cookie: security=low; PHPSESSID=ojt3mpjplist2ph5n786msebn5
>>> >> > Accept: */*
>>> >> >
>>> >> >
>>> >> > --------------------------------------------------------------------The
>>> >> > response is below
>>> >> >
>>> >> > HTTP/1.1 200 OK
>>> >> > content-length: 1414
>>> >> > x-powered-by: PHP/5.3.10-1ubuntu3.7
>>> >> > content-encoding: gzip
>>> >> > expires: Tue, 23 Jun 2009 12:00:00 GMT
>>> >> > vary: Accept-Encoding
>>> >> > server: Apache/2.2.22 (Ubuntu)
>>> >> > pragma: no-cache
>>> >> > cache-control: no-cache, must-revalidate
>>> >> > date: Wed, 07 Aug 2013 15:46:28 GMT
>>> >> > content-type: text/html;charset=utf-8
>>> >> >
>>> >> > An error occured: Given file does not exist. Please make sure the
>>> >> > logfile is
>>> >> > present in the given directory.
>>> >>
>>> >> This doesn't seem to be the right file, either w3af didn't find the
>>> >> link to the SQL injection; or you're not finding it in the logs. Take
>>> >> into account that the URL where w3af is sending a request here is
>>> >> /dvwa/vulnerabilities/sqli/?id=%3C%21--   , not that there is "no
>>> >> filename" here.
>>> >>
>>> >> > // followed by complete html fle
>>> >> >
>>> >> > I could not find anything strange, will the above details helps?
>>> >> >
>>> >> >
>>> >> > --------------------------------------------------------------------------------
>>> >> >
>>> >> >>> New issue#, after some 5-8 minutes running of scaning i get the
>>> >> >>> following
>>> >> >>> in my console and this keeps increasing and scan never stops
>>> >> >
>>> >> > The HTTP body for "http://192.168.92.135/dvwa/login.php"; could NOT be
>>> >> > parsed
>>> >> > by lxml.
>>> >> > The HTTP body for "http://192.168.92.135/dvwa/security.php"; could NOT
>>> >> > be
>>> >> > parsed by lxml.
>>> >>
>>> >> Well, that's very interesting indeed and could explain many problems.
>>> >> If w3af can't parse those HTML files, it can't extract links from it
>>> >> and can't find the sections where the vulnerabilities are.
>>> >>
>>> >> Could you please wget those two URLs and send me the results? I would
>>> >> like to do some testing here and with the HTML files I have more than
>>> >> enough to start with.
>>> >>
>>> >> >>> please see issue in #531 in issue tracker
>>> >> >
>>> >> >
>>> >> >>> just for curiosity, why can't we rely on a vulnerable application
>>> >> >>> like
>>> >> >>> DVWA for testing w3af?
>>> >>
>>> >> Because it's less detailed than the one we created. DVWA has only a
>>> >> few SQL injections, while our test suite has all I could think of:
>>> >>
>>> >>
>>> >> https://github.com/andresriancho/w3af-moth/tree/master/webroot/moth/w3af/audit/sql_injection/select
>>> >>
>>> >> >
>>> >> > Regards,
>>> >> > -S-
>>> >> >
>>> >> >
>>> >> > On Thu, Aug 8, 2013 at 9:31 PM, Andres Riancho
>>> >> > <[email protected]>
>>> >> > wrote:
>>> >> >>
>>> >> >> Shafeeque,
>>> >> >>
>>> >> >> On Thu, Aug 8, 2013 at 12:16 PM, Shafeeque O.K [gmail]
>>> >> >> <[email protected]> wrote:
>>> >> >> > Dear Andres,
>>> >> >> >
>>> >> >> > Thank you for your quick reply.
>>> >> >> >
>>> >> >> > I will check the links given for testing w3af framework.
>>> >> >> >
>>> >> >> > Some observations from my testing. They are not major, kindly note
>>> >> >> > that
>>> >> >> > I
>>> >> >> > may be wrong, you are welcome to guide me! The points are below.
>>> >> >> >
>>> >> >> >
>>> >> >> > 1. Once a full fledged scan is started, if we are trying to stop,
>>> >> >> > the
>>> >> >> > scan
>>> >> >> > never terminate, the GUI need to be forced to close. This is very
>>> >> >> > annoying
>>> >> >> > to the user.
>>> >> >>
>>> >> >> Yes, that's a known issue that we've had for a while. I'm not sure
>>> >> >> if
>>> >> >> it's in the issue tracker though. Please report it if you don't find
>>> >> >> it.
>>> >> >>
>>> >> >> > 2. The dvwa 1.0.8 is setup in another ubuntu based vm, and the
>>> >> >> > permission
>>> >> >> > set for my /var/www directory is root:root, interestingly no
>>> >> >> > blind_sqli,
>>> >> >> > lfi
>>> >> >> > is found, I made the permission as root:www-data and then I did
>>> >> >> > the
>>> >> >> > scan
>>> >> >> > it
>>> >> >> > gave me bunch of blind_sqli vulnerabilities detected and along
>>> >> >> > with
>>> >> >> > one
>>> >> >> > lfi
>>> >> >> > vulnerabilities.
>>> >> >>
>>> >> >> I'm not a DVWA user, so I really don't know what's going on there.
>>> >> >>
>>> >> >> > 3. I tried to exploit the local_file_reader exploit detected and I
>>> >> >> > got
>>> >> >> > the
>>> >> >> > following error
>>> >> >> >
>>> >> >> > Exploiting 'local_file_reader'...
>>> >> >> >   1 vulnerabilites to exploit
>>> >> >> > Checking suitability for vuln 'Local file inclusion
>>> >> >> > vulnerability'...
>>> >> >> >   ok
>>> >> >> > Exploiting...
>>> >> >> > Cut algorithm error: len(header+footer)>len(body).
>>> >> >>
>>> >> >> That should never happen I think :D We should check that, but it's
>>> >> >> very low priority
>>> >> >> If you can send me a way to reproduce that without depending on a
>>> >> >> DVWA
>>> >> >> setup, that would be awesome
>>> >> >>
>>> >> >> > Done
>>> >> >> >
>>> >> >> > I did : sudo chown root:www-data
>>> >> >> > /var/www/dvwa/external/phpids/0.6/lib/IDS/tmp on my ubuntu vm,
>>> >> >> > able
>>> >> >> > to
>>> >> >> > get
>>> >> >> > the shell.
>>> >> >>
>>> >> >> Well, then it's not a w3af issue, it's a DVWA issue where you're
>>> >> >> enabling/disabling sections and vulnerabilities of the site which
>>> >> >> don't work because of specific permissions are required.
>>> >> >>
>>> >> >> > The shell appeared and then during running the payload
>>> >> >> > apache_version an exception occurred and it is logged as issue
>>> >> >> > #530
>>> >> >> > in
>>> >> >> > github.
>>> >> >>
>>> >> >> Same as above, if you give me a way to reproduce without installing
>>> >> >> DVWA (just a PHP file) I'll work on it.
>>> >> >>
>>> >> >> > Typing in the shell was bit difficult, it was not smooth at all.
>>> >> >>
>>> >> >> Could you please elaborate more on that?
>>> >> >>
>>> >> >> > 4. Please see the issues #529,
>>> >> >>
>>> >> >> This is not a w3af bug. The php script triggered a 500 exception and
>>> >> >> we're letting you know about that
>>> >> >>
>>> >> >> > #525,
>>> >> >>
>>> >> >> See comment in issue tracker
>>> >> >>
>>> >> >> > #521
>>> >> >>
>>> >> >> Fixed, thanks!
>>> >> >>
>>> >> >> > 5. what ever the exceptions has occurred I have logged this under
>>> >> >> > graytips/[email protected] , in github issue lists. I will
>>> >> >> > recheck
>>> >> >> > the
>>> >> >> > list and inform you if missed anything.
>>> >> >> >
>>> >> >> > 6. I am wondering why SQLi in the DVWA is not detected eventhoough
>>> >> >> > I
>>> >> >> > gave
>>> >> >> > the cookie file which is set the dvwa sceurity to low. With the
>>> >> >> > same
>>> >> >> > cookie
>>> >> >> > details, SQLMap is detecting the SQLi in dvwa.
>>> >> >>
>>> >> >> You should read the HTTP traffic output
>>> >> >>
>>> >> >> > 7. Few Items that are related to the profile saving in to
>>> >> >> > different
>>> >> >> > name,
>>> >> >> > need to recheck before i report.
>>> >> >> >
>>> >> >> > Hope my observations will help to improve w3af.
>>> >> >> >
>>> >> >> >
>>> >> >> >
>>> >> >> >
>>> >> >> >
>>> >> >> > On Thu, Aug 8, 2013 at 8:06 PM, Andres Riancho
>>> >> >> > <[email protected]>
>>> >> >> > wrote:
>>> >> >> >>
>>> >> >> >> Shafeeque,
>>> >> >> >>
>>> >> >> >> On Thu, Aug 8, 2013 at 11:25 AM, Shafeeque O.K [gmail]
>>> >> >> >> <[email protected]> wrote:
>>> >> >> >> > Hi,
>>> >> >> >> >
>>> >> >> >> > I have playing around with latest w3af and testing DVWA using
>>> >> >> >> > this
>>> >> >> >> > tools.
>>> >> >> >> >
>>> >> >> >> > Some how I am failing to get the SQLi, injection
>>> >> >> >> > vulnerabilities
>>> >> >> >> > of
>>> >> >> >> > DVWA
>>> >> >> >> > detected by w3af. I am able to get BlindSQLi bugs.. So I
>>> >> >> >> > decided
>>> >> >> >> > to
>>> >> >> >> > check
>>> >> >> >> > whether the SQLi is realling working (ofcourse it works)
>>> >> >> >> >
>>> >> >> >> > I understand that there was some unit testing scripts shipped
>>> >> >> >> > with
>>> >> >> >> > earlier
>>> >> >> >> > w3af. I have seen this on SecurityDojo, however when I run the
>>> >> >> >> > SQLi
>>> >> >> >> > test
>>> >> >> >> > against the w3af unit testing scripts available in
>>> >> >> >> > SecurityDojo,
>>> >> >> >> > the
>>> >> >> >> > sqli is
>>> >> >> >> > not detected.
>>> >> >> >> >
>>> >> >> >> > I understand the problem is that the script to recreate the
>>> >> >> >> > required
>>> >> >> >> > tables
>>> >> >> >> > create_tables.sqli is missing, hence the required tables are
>>> >> >> >> > not
>>> >> >> >> > created
>>> >> >> >> > properly.
>>> >> >> >> >
>>> >> >> >> > Would like to know whether the framework testing scrips are
>>> >> >> >> > still
>>> >> >> >> > valid
>>> >> >> >> > against the latest version of 3waf, if so where can I get the
>>> >> >> >> > complete
>>> >> >> >> > working scripts.
>>> >> >> >>
>>> >> >> >> Well, if you really want to run unit-tests for w3af you'll need
>>> >> >> >> to
>>> >> >> >> install nosetests, more on this here [0]. The scripts you find in
>>> >> >> >> the
>>> >> >> >> "scripts/" directory are our OLD, really OLD, "unit-tests". Right
>>> >> >> >> now
>>> >> >> >> we use things like this [1] to verify that our framework works.
>>> >> >> >>
>>> >> >> >> [0] https://github.com/andresriancho/w3af/wiki/Developer's-Guide
>>> >> >> >> [1]
>>> >> >> >>
>>> >> >> >>
>>> >> >> >>
>>> >> >> >> https://github.com/andresriancho/w3af/blob/master/plugins/tests/audit/test_sqli.py
>>> >> >> >>
>>> >> >> >> > During my test I have found interesting observations on latest
>>> >> >> >> > w3af.
>>> >> >> >> > I
>>> >> >> >> > will
>>> >> >> >> > compile the lists and send  this after reconfirming my
>>> >> >> >> > experiments.
>>> >> >> >> > Meanwhile I look for the support to get the unit testing
>>> >> >> >> > scripts.
>>> >> >> >>
>>> >> >> >> Intrigued to know what you've found :)
>>> >> >> >>
>>> >> >> >> > Thanks in advance.
>>> >> >> >> >
>>> >> >> >> > --
>>> >> >> >> > Regards,
>>> >> >> >> > -S-
>>> >> >> >> >
>>> >> >> >> >
>>> >> >> >> >
>>> >> >> >> >
>>> >> >> >> >
>>> >> >> >> > ------------------------------------------------------------------------------
>>> >> >> >> > Get 100% visibility into Java/.NET code with AppDynamics Lite!
>>> >> >> >> > It's a free troubleshooting tool designed for production.
>>> >> >> >> > Get down to code-level detail for bottlenecks, with <2%
>>> >> >> >> > overhead.
>>> >> >> >> > Download for free and get started troubleshooting in minutes.
>>> >> >> >> >
>>> >> >> >> >
>>> >> >> >> >
>>> >> >> >> >
>>> >> >> >> > http://pubads.g.doubleclick.net/gampad/clk?id=48897031&iu=/4140/ostg.clktrk
>>> >> >> >> > _______________________________________________
>>> >> >> >> > W3af-users mailing list
>>> >> >> >> > [email protected]
>>> >> >> >> > https://lists.sourceforge.net/lists/listinfo/w3af-users
>>> >> >> >> >
>>> >> >> >>
>>> >> >> >>
>>> >> >> >>
>>> >> >> >> --
>>> >> >> >> Andrés Riancho
>>> >> >> >> Project Leader at w3af - http://w3af.org/
>>> >> >> >> Web Application Attack and Audit Framework
>>> >> >> >> Twitter: @w3af
>>> >> >> >> GPG: 0x93C344F3
>>> >> >> >
>>> >> >> >
>>> >> >> >
>>> >> >> >
>>> >> >> > --
>>> >> >> > Regards,
>>> >> >> > -S-
>>> >> >>
>>> >> >>
>>> >> >>
>>> >> >> --
>>> >> >> Andrés Riancho
>>> >> >> Project Leader at w3af - http://w3af.org/
>>> >> >> Web Application Attack and Audit Framework
>>> >> >> Twitter: @w3af
>>> >> >> GPG: 0x93C344F3
>>> >> >
>>> >> >
>>> >> >
>>> >> >
>>> >> > --
>>> >> > Regards,
>>> >> > -S-
>>> >>
>>> >>
>>> >>
>>> >> --
>>> >> Andrés Riancho
>>> >> Project Leader at w3af - http://w3af.org/
>>> >> Web Application Attack and Audit Framework
>>> >> Twitter: @w3af
>>> >> GPG: 0x93C344F3
>>> >
>>> >
>>> >
>>> >
>>> > --
>>> > Regards,
>>> > -S-
>>>
>>>
>>>
>>> --
>>> Andrés Riancho
>>> Project Leader at w3af - http://w3af.org/
>>> Web Application Attack and Audit Framework
>>> Twitter: @w3af
>>> GPG: 0x93C344F3
>>
>>
>>
>>
>> --
>> Regards,
>> -S-
>
>
>
> --
> Andrés Riancho
> Project Leader at w3af - http://w3af.org/
> Web Application Attack and Audit Framework
> Twitter: @w3af
> GPG: 0x93C344F3



-- 
Andrés Riancho
Project Leader at w3af - http://w3af.org/
Web Application Attack and Audit Framework
Twitter: @w3af
GPG: 0x93C344F3

------------------------------------------------------------------------------
Get 100% visibility into Java/.NET code with AppDynamics Lite!
It's a free troubleshooting tool designed for production.
Get down to code-level detail for bottlenecks, with <2% overhead. 
Download for free and get started troubleshooting in minutes. 
http://pubads.g.doubleclick.net/gampad/clk?id=48897031&iu=/4140/ostg.clktrk
_______________________________________________
W3af-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/w3af-users

Reply via email to