OWTF 1.0 “Lionheart” released!

UPDATE: 10/10/2014 – Added link to OWTF 1.0 “Lionheart”: Automated Rankings

OWTF 1.0 “Lionheart” (beta) is dedicated to everybody that helped make this challenging release happen, in particular to the courage of all this people, who overcame their sweat, blood and tears to make OWTF the amazing tool it is now, to all of you, thank you!
We would like to take this opportunity to thank all contributors, mentors, everybody who sent us cool ideas, feedback or reported bugs, you all played a role in making OWTF be what is is now, many thanks to you all!.
 
Some links:

OWTF 1.0 "Lionheart" (beta) is our biggest release ever, this contains many cool projects implemented by many , so, in no particular order, here is a quick overview of the new major features! 🙂
 
 
NOTE: For a more detailed explanation please see OWTF 1.0 “Lionheart”: Automated Rankings

When testing a bunch of web applications, OWTF will append the ranking associated with each target for an easy quick overview.

 

4YedJzwV9M6YE3R8zM7H_XB41c-eW2qPAs4kkiA6bPhZ2TwrlSHlyDKQSdei7QtGatJkeRLGr3tEeCV25-Q_ljQj-US8uEwsJ1UrdntmAqgvhxExPtW_TeX5lnbMbf_U8g
More information can be retrieved when accessing to one specific target report. Here, OWTF uses labels and color codes to help the user reviewing the results.mixed_risks3.png
 
Sexy Web UI + REST API + Database by Bharadwaj Machiraju
  • OWTF now features a Web UI from where you can run scans, plugins, etc.
  • RESTful API to send commands to OWTF!
  • Highly performant postgres database
 
  • Interactively send HTTP requests to a target
  • Record and play Zest scripts
  • Pass interesting HTTP requests to ZAP using the ZAP API
 
WAF bypasser by Marios Kourtesis
 
Detecting blocked characters and searching for bypasses:
2qlk1-gQ9AajCweg16gnILNn8svQQDBTfINnOrxthtfSnpWKwwOfJuJMXAAWJAqLnoAc_U4lX-KZRmKcGZYbzdn6oZoY6X0sWlxPlM8S1pIriI0eN4j3n2dUPSJQic1yEg
Fuzzing with XSS payloads:
8SsnUDbAaBG5q1t9bdbu7nyVC0zgvHCJABWimKwgjZeGQ1mg_dheYBGwKxawZFR6qrtJvvwrop77cvGkYSJnm9hDKEUjvnykA_PiY7KImtGs3cK9VN4_cOT_8ObH7c8-6Q

 

OWASP OWTF – State Improvements by Viyat Bhalodia
 

 

_lLRKtemZQXmkmTRJNezC2_re1hA1ydgTO9toXWJZTf1x_zhJ7QpSMUPHND_VwJ2BToEwk1ysZmuZkM1yMl6NZ6OpJIOizVhQgvlodxfN8e2CnsldveVuc_q7YT1pJK-NQ3d3GmBkZiCzrqZIsc5_-606bYNgoTP4ta-5IEWAHSXYkpfxtNnTAuD-ZYMv3m2rMjaHJL5_hEA_IlEXImth-FdxFELKy3-74aMmsoJbDhOCHQFZ1nuJhO0MQgHA6ib2jhQJ4XBQ680BOkb99oNVymWjD5WlM1z3FQJo0u_M0JYA3fM8VuCk_nd2uIPHCuaTk2Ky0OoVo266u-wC-eWwvqMUnFuYF42cZyAE7cMZ1wPzPSBx0KcZ9Av-zViAwlFRQHiEg
AHf1V6aAzu-3BLkxGkOSNw97-OSxsofLgJhpCD3I8rRTKTHT_WE9An2gXmEhhnFNxWVpYR6uNbyfJBxJhYW4s_nPjK5pXSXtaf88kEKJgGsr56z_eNwPMasSlIwCXisMdA
 
BgBKuQjTjRksXYeZIkJbiO37b7lc-TIezHXsRLVtxstYvJ93fDkoRrXmJ7r8sGLrpGcV39w6npv1pSI6Mox99QgRZtGstAgbUtJMag55tuGbtYEjmzcxkxmFZ74_ifyYxw
Improved Plug-n-hack support by Punga Cornel
 
Plug-n-Hack is a proposed Mozilla standard.
Now OWTF supports Plug-n-Hackv2, which allows you to intercept, change and fuzz client side messages!
 
configuration page (nightly version).png

 

configuration commands to injected probe.png
 

 

monitor events message.png

 

Online passive scanner, Boilerplate templates and Flexible Mappings by Anirudh Anand

 

  • Online Boilerplate templates: Easy to copy-paste stuff into your pentest reports (i.e. mitigation, etc.)
  • Passive Online scanner: Try some of the OWTF passive tests without installing anything! 🙂
  • Flexible mappings: OWTF will now let you view plugins by OWASP Top 10, OWASP Testing Guide v4, OWASP Testing Guide v3 and even NIST! 🙂
demo.jpg