w3af扫描DVWA中sql漏洞

使用burp拦截请求,删除请求中
GET /dvwa/vulnerabilities/fi/?page=include.php HTTP/1.1
Host: 192.168.59.142

[color=blue]root@kali:~# cat w3af.txt[/color]
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20140722 Firefox/24.0 Iceweasel/24.7.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.59.142/dvwa/vulnerabilities/sqli/?id=12345&Submit=Submit
Cookie: security=[color=red][b]low[/b][/color]; PHPSESSID=2efb28ea69e34344dd07fb72d06684bd
Connection: keep-alive

[color=blue]root@kali:~# w3af_console[/color]
[color=blue]w3af>>> plugins
w3af/plugins>>> output console
w3af/plugins>>> audit sqli
w3af/plugins>>> back
w3af>>> http-settings
[b]w3af/config:http-settings>>> set headers_file /root/w3af.txt[/b]
w3af/config:http-settings>>> set proxy_address 127.0.0.1
w3af/config:http-settings>>> back
The configuration has been saved.
w3af>>> target
w3af/config:target>>> set target 192.168.59.142/dvwa/vulnerabilities/sqli/?id=23456&Submit=Submit
w3af/config:target>>> back
The configuration has been saved.
w3af>>> start
[/color]A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "You have an error in your SQL syntax;". The error was found on response with id 36.
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "MySQL server version for the right syntax to use". The error was found on response with id 36.
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "You have an error in your SQL syntax;". The error was found on response with id 35.
A SQL error was found in the response supplied by the web application, the error is (only a fragment is shown): "MySQL server version for the right syntax to use". The error was found on response with id 35.
SQL injection in a MySQL database was found at: "http://192.168.59.142/dvwa/vulnerabilities/sqli/", using HTTP method GET. The sent data was: "id=a'b"c'd"&Submit=Submit". This vulnerability was found in the request with id 36.
SQL injection in a MySQL database was found at: "http://192.168.59.142/dvwa/vulnerabilities/sqli/", using HTTP method GET. The sent data was: "id=a%27b%22c%27d%22&Submit=Submit". The modified parameter was "id". This vulnerability was found in the request with id 35.
Scan finished in 17 seconds.
Stopping the core...
w3af>>>

从burp拦截的流量中查看w3af发送的各种请求

[img]http://dl2.iteye.com/upload/attachment/0101/8056/1b5e6ba4-8388-3287-8ba2-5c5231d28abd.jpg[/img]

你可能感兴趣的:(web,kali)