New Update Launched Contact Us Download Now!

Wapiti - Automated Vulnerability Scanner

Please wait 0 seconds...
Scroll Down and click on Go to Link for destination
Congrats! Link is Generated

 

Wapiti is an advanced automated command line vulnerability scanner. It helps penetration testers and bug bounty hunters to scan web based application to make it secure or search for loopholes. It is free and open source and has had some recent edits and updates. It comes with Kali Linux.

wapiti automatic vulnerability scanner

Wapiti Key Features

Wapiti can detect lots of vulnerabilities, so we don't need to manually visit every pages of an web application to find vulnerabilities. Wapiti can find following vulnerabilities:

  1. File disclosure (Local and remote include/require, fopen, readfile...)
  2. Database Injection (PHP/JSP/ASP SQL Injections and XPath Injections)
  3. XSS (Cross Site Scripting) injection (reflected and permanent)
  4. Command Execution detection (eval(), system(), passtru()...)
  5. CRLF Injection (HTTP Response Splitting, session fixation...)
  6. XXE (XML External Entity) injection
  7. SSRF (Server Side Request Forgery)
  8. Use of know potentially dangerous files (by using the Nikto database)
  9. Weak .htaccess configurations that can be bypassed
  10. Presence of backup files giving sensitive information (source code disclosure)
  11. Shellshock (aka Bash bug)
  12. Open Redirects
  13. Uncommon HTTP methods that can be allowed (PUT)

Installing and Using Wapiti on Kali Linux

Wapiti latest version (3.0.3 now) comes pre-installed with Kali Linux, if some Kali Linux lighter version doesn't have it installed then we can install it by simply using following command:

sudo apt-get install wapiti

After installing this we can check the help section of this tool by applying following command:

wapiti -h

The following screenshot shows the output of the applied help command:

wapiti help menu

Now we can run this tool against a website by using following command:

wapiti -u https://target.site/

Then it will scan the website (https://target.site/ is just an example) for URL's. After the scanning process is done wapiti will run various modules for finding the vulnerabilities. We can see it on the following screenshot:

wapiti simple scanning
We run it on mutillidae web application on localhost

Wapiti crawls all the pages and runs its modules on all the pages so it might be time consuming. On our this localhost machine it took more than 18 minutes to complete the scan and running the all modules. On a real website it might take hours.

If the website of web application have too many pages then it might take a very long time. Fortunately we can skip the modules. Suppose we know that our target website have not any blindsql vulnerability then we can skip this module. When the module blindsql is working we need to to press CTRL+C.

Then it will prompt with some options as the following screenshot:

Skipping modules

Here if we press 'r' & Enter, then it will stop everything and generate the report. If we want to skip the running module then we just need to press 'n' and Enter, then wapiti will skip the module and run the next module.

Even we can continue the current attack using 'c', and quit without generating report by pressing 'q'.

After the scan is complete we can see a HTML report is crated on our /home/kali/.wapiti/generated_report directory.

We can navigate to the directory from file manager (on in terminal using cd command):

wapiti generated report

Now we can open this on browser to see the full report. As we did in the following screenshot:

wapiti full report

We can click on the found vulnerabilities to get additional information on this. Here is an closer look of XSS vulnerability on this Wapiti report.

XSS vulnerability found using Wapiti

This is how Wapiti works. It's very useful for cybersecurity researchers and bug bounty hunters.

There are lots of options in this tool we just checked the basics on our above section.

Wapiti can pause the scan and resume it later (It's very useful because sometimes it took whole day or more than it).

We can save our Wapiti report HTML file on a required directory by using following command:

wapiti -u https://target.site/ -o /home/kali/Desktop

Please don't forget to add a '/' after the target site (it requires the full address like https://mytarget.com/ not like mytarget.com ), otherwise Wapiti will not think the address is complete.

We can check the help section of this tool for more information. Carefully check the help section and tell us,

"What command we need to use if we just use the blindsql module on a website called https://target.com/ ?"

Got the answer? Please comment in the comment section. Question and answer will improve our learning.

For any problem or help we are always there. Please describe the full problem we always happy to help. We read each and every comment and, We always answer.

We are available on Twitter and GitHub, we share article updates there make sure to follow there to get updated. Also subscribe our E-mail subscription to get notification about new articles directly on e-mail.

إرسال تعليق

Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.