12.07.2015 Views

w3af Guide de l'Utilisateur - Exploit Database

w3af Guide de l'Utilisateur - Exploit Database

w3af Guide de l'Utilisateur - Exploit Database

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

| | | | of the eval(). |...Pour activer les plugins xss et sqli, puis vérifier que la comman<strong>de</strong> a été comprisepar le framework, nous exécutons les comman<strong>de</strong>s suivantes:<strong>w3af</strong>/plugins>>> audit xss, sqli<strong>w3af</strong>/plugins>>> audit|------------------------------------------------------------|| Plugin name | Status | Conf | Description ||------------------------------------------------------------|...| sqli | Enabled | | Find SQL injection || | | | bugs. |...| xss | Enabled | Yes | Find cross site || | | | scripting || | | | vulnerabilities. || xst | | | Verify Cross Site || | | | Tracing || | | | vulnerabilities. ||------------------------------------------------------------|<strong>w3af</strong>/plugins>>>Ou, si l'utilisateur est intéressé par savoir exactement ce que fait un plugin, ilpeut aussi utiliser la comman<strong>de</strong> “<strong>de</strong>sc” comme ceci:<strong>w3af</strong>>>> plugins<strong>w3af</strong>/plugins>>> audit <strong>de</strong>sc fileUploadThis plugin will try to expoit insecure file upload forms.One configurable parameter exists:- extensions

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!