Wxf: Web Exploitation Framework presented at OWASP Appsec 2010

by Ken Johnson (FishNet Security),

Tags: Security Web Application Security

URL : http://www.owasp.org/index.php/WXf:_Web_Exploitation_Framework

Summary : The web application security field has seen a large expansion in the last decade. In that time the amount of community participation has significantly increased, however, efforts have become increasingly discontigous.

Several web application security centric frameworks have come and gone that were intended to address this challenge. The goal of Web Exploitation Framework (wXf) is to take the experience of using these tools, the perceived shortcomings and build something that is easy to use, install and extend.

Web Exploitation Framework (“wXf”) is written in Ruby and was originally an idea as a module for Rapid 7’s Metasploit but the idea quickly outgrew a network exploitation framework. Instead, we designed a core that focuses on the web standards along with exploits & payloads designed specifically for defeating web application protections. wXf maintains somewhat of the look and feel of Metasploit but the code is entirely different. Our goal is to have a security professional familiar with the Metasploit framework using wXf in under 10 minutes.