On Thu, Nov 19, 2009 at 12:34 PM, pdp <pdp.gnu...@googlemail.com> wrote:
>
> Yes and no. The spider uses a pattern matching strategy to extract
> urls and forms (destinations in the internal lingo).
why this approach and not a js code that does something like:
"""
for tag in document.getTagByName('*'):
tag.click()
tag.onMouseOver()
tag.onChange()
"""
I think that something like that would be TRIVIAL to implement in your
environment, and would provide:
- Crawling of normal websites, without depending on URL regular
expressions, which always suck.
- Crawling of any website, with any combination of javascript.
The only problem I see, is that you're going to be running javascript
code that you don't control, which could potentially harm (somehow)
the scanner (add an infinite loop in js, when the scanner clicks on
it, it will go into infinite loop too) or the client box (don't really
know how to harm the box).
> Everything works
> in a generic fashion.
Sounds nice.
> Support for other patterns can be easily added.
Patterns == regular expressions?
Patterns are bad and you should avoid them. I can't not in w3af...
but.... you should avoid them. Your environment is more friendly.
> The next version will allow you to perform some browsing of the
> application before starting a test which will significantly improve
> the process of identifying ajax problems.
Great.
> pdp
>
> P.S. the current trunk supports python so there are opportunities for
> future integration between both testing platforms. :)
hehe, nice. We'll see how that works. I've been trying to find a GPL
tool that will "click over javascript" for me, and hand me out the
results somehow... maybe websecurify is the tool I'm looking for...
but only if the JS support is added.
Cheers,
> On Nov 17, 5:32 am, Andres Riancho <andres.rian...@gmail.com> wrote:
>> pdp,
>>
>> Does websecurify support javascript in the crawler/spidering
>> process? I didn't had the time to verify it against a tool like wivet.
>>
>> Cheers,
>>
>> --
>> Andrés Rianchohttp://w3af.sf.net/http://www.bonsai-sec.com/
--
Andrés Riancho
Founder, Bonsai - Information Security
http://www.bonsai-sec.com/
http://w3af.sf.net/