Primary: Discovery.
Secondary: N/A.
Tool that execute "fuzzing" techniques on web applications in order to detect common vulnerabilities.
Supported technologies: Web application (HTTP/HTTPS).
Operative mode: Active.
Detect common vulnerabilities present on the web application.
Reports:
Output reports: ✔
Reports in TXT, XML, HTML format containing:
Perform a basic "fuzzing" on a web application.Start the application and in the field "Target URL" enter the URL to test that contains parameters (GET).
Press the "Scan" button to start the test. The tool began testing the parameters provided in the URL against the "payload" predefined order to analyze the results of the requests made.
When the tool identifies the presence of a vulnerability in red show the occurrence.
Finally, testing is complete the "Scan Reports" window will be displayed with the outcomes identified:
Plain text report example:
Link: http://www.powerfuzzer.com/
Author(s): Marcin Kozlowski
Contact: http://sourceforge.net/projects/powerfuzzer/support
License: GNU General Public License version 2.0 (GPLv2)