q 文件处理错误。
q 数据库注入(包括PHP/JSP/ASP SQL注入和XPath注入)。
q XSS(跨站脚本)注入。
q LDAP注入。
q 命令执行检测(例如,eval(),system(),passtru()等)。
q CRLF注入。
‧文件处理瑕疵
‧能执行的系统命令
‧Database Injection
‧XSS Injection
‧LDAP Injection
‧CRLF (换行字符) Injection
建议采用 Python 2.5 来执行,已内含所需之 ctypes,我用一个正在开发中的站点测试,很快就找出了两个当初偷懒而衍生的问提,测试画面 :
/tmp/wapiti-1.1.6# python2.5 wapiti.py <a href="http://www.xxx.tw" title="http://www.xxx.tw">http://www.xxx.tw</a> lswww will be far less effective without tidy please install libtidy ( <a href="http://tidy.sourceforge.net/" title="http://tidy.sourceforge.net/">http://tidy.sourceforge.net/</a> ), ctypes ( <a href="http://starship.python.net/crew/theller/ctypes/" title="http://starship.python.net/crew/theller/ctypes/">http://starship.python.net/crew/theller/ctypes/</a> ) and uTidylib ( <a href="http://utidylib.berlios.de/" title="http://utidylib.berlios.de/">http://utidylib.berlios.de/</a> ) Wapiti-1.1.6 (wapiti.sourceforge.net) ........................................................................ Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Found XSS in <a href="http://www.xxx.tw/service/service_new.php" title="http://www.xxx.tw/service/service_new.php">http://www.xxx.tw/service/service_new.php</a> with params = btnSave=%B0e%A5X%B1z%AA%BA%B0%DD%C3D&question=%3Cscript%3Evar+wapiti_687474703a2f2f7777772e6d797374796c652e74772f736572766963652f736572766963655f6e65772e706870_7175657374696f6e%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&email=on coming from <a href="http://www.xxx.tw/service/service_new.php" title="http://www.xxx.tw/service/service_new.php">http://www.xxx.tw/service/service_new.php</a> Found XSS in <a href="http://www.xxx.tw/service/guest_login.php" title="http://www.xxx.tw/service/guest_login.php">http://www.xxx.tw/service/guest_login.php</a> with params = password=on&email=%3Cscript%3Evar+wapiti_687474703a2f2f7777772e6d797374796c652e74772f736572766963652f67756573745f6c6f67696e2e706870_656d61696c%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&submit=%ACd%B8%DF&mode=on coming from <a href="http://www.xxx.tw/service/guest_login.php?list=atm" title="http://www.xxx.tw/service/guest_login.php?list=atm">http://www.xxx.tw/service/guest_login.php?list=atm</a> Looking for permanent XSS -------------------------