q 文件處理錯誤。
q 數據庫注入(包括PHP/JSP/ASP SQL注入和XPath注入)。
q XSS(跨站腳本)注入。
q LDAP注入。
q 命令執行檢測(例如,eval(),system(),passtru()等)。
q CRLF注入。
‧文件處理瑕疵
‧能執行的系統命令
‧Database Injection
‧XSS Injection
‧LDAP Injection
‧CRLF (換行字符) Injection
建議采用 Python 2.5 來執行,已內含所需之 ctypes,我用一個正在開發中的站點測試,很快就找出了兩個當初偷懶而衍生的問提,測試畫面 :
/tmp/wapiti-1.1.6# python2.5 wapiti.py <a title="http://www.xxx.tw">http://www.xxx.tw</a> lswww will be far less effective without tidy please install libtidy ( <a title="http://tidy.sourceforge.net/">http://tidy.sourceforge.net/</a> ), ctypes ( <a title="http://starship.python.net/crew/theller/ctypes/">http://starship.python.net/crew/theller/ctypes/</a> ) and uTidylib ( <a title="http://utidylib.berlios.de/">http://utidylib.berlios.de/</a> ) Wapiti-1.1.6 (wapiti.sourceforge.net) ........................................................................ Attacking urls (GET)... ----------------------- Attacking forms (POST)... ------------------------- Found XSS in <a title="http://www.xxx.tw/service/service_new.php">http://www.xxx.tw/service/service_new.php</a> with params = btnSave=%B0e%A5X%B1z%AA%BA%B0%DD%C3D&question=%3Cscript%3Evar+wapiti_687474703a2f2f7777772e6d797374796c652e74772f736572766963652f736572766963655f6e65772e706870_7175657374696f6e%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&email=on coming from <a title="http://www.xxx.tw/service/service_new.php">http://www.xxx.tw/service/service_new.php</a> Found XSS in <a title="http://www.xxx.tw/service/guest_login.php">http://www.xxx.tw/service/guest_login.php</a> with params = password=on&email=%3Cscript%3Evar+wapiti_687474703a2f2f7777772e6d797374796c652e74772f736572766963652f67756573745f6c6f67696e2e706870_656d61696c%3Dnew+Boolean%28%29%3B%3C%2Fscript%3E&submit=%ACd%B8%DF&mode=on coming from <a title="http://www.xxx.tw/service/guest_login.php?list=atm">http://www.xxx.tw/service/guest_login.php?list=atm</a> Looking for permanent XSS -------------------------