Comparative Study of Web Application Penetration Testing Tools
Comparative Study of Web Application Penetration Testing Tools
The main objective of this paper is to test So the scene is can we blindly trust that
the widely used penetration testing tool attacker will not be able to attack our web
‘Accunetix and ‘w3af’ against certain server ? Here the tools Accunetix and w3af
vulnerabilities and compare them with comes in. They actually try to expose all the
vulnerabilities in our application by using <script>alert('Hello');</script> a pop-up with
familiar attack methods. the text "Hello" would be shown on that page
of the guest book. This type of vulnerability
The tools we have used in this context are
can also be exploited in a more serious way.
Accunetix and w3af.
4. CSRF –
II. TYPES OF VULNERABILITIES It means Cross site request forgery. It
actually compels a user's browser for loading
In order to use these tools to find loopholes.
a request that performs an action on a web
Firstly we must have prior knowledge of
application that user is currently
various vulnerabilities.
authenticated to.
They are :
Accunetix – Reporting –
In July 2005, Acunetix came into limelight Report generated by w3af and accunetix.
with a powerful tool called the Web
Extensive reporting facilities including
VISA PCI compliance reports. Multi-
threaded and lightning fast scanner
crawls hundreds of thousands of pages
with ease Intelligent crawler detects web
server type and application language.
Acunetix crawls and analyzes websites
including flash content, SOAP and
AJAX. Port scans a web server and runs
Fig 1. W3af Report security checks against network services
running on the server.
Future Scope:
372
[3] Mcallister, S., Kirda, E., Kruegel, C.:
Leveraging User Interactions for In-Depth
Testing of Web Applications. In: roceedings
of the 11th international symposium on
Recent Advances in Intrusion Detection.
RAID '08, Berlin, Heidelberg, Springer-
Verlag (2008) 191_210