Primary: Exploitation.
Secondary: N/A.
Tool that performs brute force attack combined with fuzzing techniques, thus enabling the exploitation of vulnerable parameters and headers through POST and GET methods.
Supported technologies: Web applications (HTTP/HTTPS).
Operative mode: Active.
Exploit vulnerabilities present on web application through fuzzing techniques.
Reports:
Output reports: ✔
Perform a brute force attack on a web application login page. Start the tool and on the “Applications” menu provide the following information:
Include the fuzzer identifier “FUZZ” or “FUZ2Z” on the required parameters to be included on the brute force attack.
Once the configuration is done, press the “Start attack” button to initiate the brute force attack. In the progress bar will be displayed the status of the attack for the number of word being tested and the remaining ones.
When the attack finishes, on the progress bar will be displayed the message “Attack finished OK”.
The results will be displayed under each one of the list of words, including the results which were successful at accessing the web application.
On the “Logs” tab additional information will be presented such start and end of the attack, list of words used for the attack, URL, etc.
Link: https://www.owasp.org/index.php/Category:OWASP_Webslayer_Project.
Author(s): Christian Martorella
Contact: owasp-Webslayer-project [at] lists.owasp.org
License: GPL v 2.0.