Pin It

Free Web Application Exploiter


Web Application Exploiter adalah sebuah software yang di gunakan untuk penetration testing atau menguji keamanan web. Jika dulu adalah tools Havij yang populer dengan menangani kerentanan kini Itsecteam telah merilis Web Application Exploiter (WAppEx) yang sama fungsinya dengan tools Havij namun dengan software terbaru ini lebih complete dalam melakukan pengujian pada web.

WAppEx juga dilengkapi dengan peralatan pengujian penetrasi yang membuat lebih efektif dengan Database Exploit dan ahli keamanan alat yang disediakan meliputi Manual request, Exploit editor, Dork Finder, Hidden file Checker dan lainya. Beberapa vulneralibilities sudah di ringkas pada software ini, seperti Local File Disclosure (LFD), Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL Injection (SQLI), Remote OS Command Execution (RCE), dan Server-side Code Injection (SCI). Dan berikut fitur dari software Web Application Exploiter (WAppEx). 



Feature of Web Application Exploiter :

  • An exploit database covering a wide range of vulnerabilities.
  • A set of tools useful for penetration testing:
    • Manual Request
    • Dork Finder
    • Exploit Editor
    • Hidden File Checker
    • Neighbor Site Finder
    • Find Login Page
    • Online Hash Cracker
    • Encoder/Decoder
  • Execute multiple instances of one or more exploits simultaneously.
  • Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
  • Test a list of target URL’s against a number of selected exploits.
  • Allows you to create your own exploits and payloads and share them online.
  • A number of featured exploits (6) and payloads (39) bundled within the software exploit database:
    • Testing and exploiting of Local File Inclusion vulnerabilities
    • Testing and exploiting of Local File Disclosure vulnerabilities
    • Testing and exploiting of Remote File Inclusion vulnerabilities
    • Testing and exploiting of SQL Injection vulnerabilities
    • Testing and exploiting of Remote Command Execution Inclusion vulnerabilities
    • Testing and exploiting of Server-side Code Injection vulnerabilities





Enjoy friend...



Kindly Bookmark this Post using your favorite Bookmarking service:
Technorati Digg This Stumble Stumble Facebook Twitter

0 comments:

Blogger Tricks And TipsComment here

DMCA.com

Blog Archive

 

Site info

Free counters! ping fast  my blog, website, or RSS feed for Free Yahoo bot last visit powered by MyPagerank.Net Msn bot last visit powered by MyPagerank.Net Text Backlink Exchanges Kostenlose Backlinks bei http://www.backlink-clever.de

| Hackers Trix 7 © 2010. All Rights Reserved | Template Style by Lord HTML | Design by MBT | Back To Top |

Your Text Link Here