1. wapiti(1)
  2. wapiti(1)

NAME

wapiti - A web application vulnerability scanner in Python

SYNOPSIS

wapiti -u BASE_URL [options]

DESCRIPTION

Wapiti allows you to audit the security of your web applications.

It performs "black-box" scans, i.e. it does not study the source code of the application but will scan the webpages of the deployed webapp, looking for scripts and forms where it can inject data.

Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.

Wapiti is useful only to discover vulnerabilities: it is not an exploitation tools. Some well known applications can be used for the exploitation part like the recommended sqlmap.

OPTIONS SUMMARY

Here is a summary of options. It is essentially what you will get when you launch Wapiti without any argument. More detail on each option can be found in the following sections.

TARGET SPECIFICATION:

ATTACK SPECIFICATION:

PROXY AND AUTHENTICATION OPTIONS:

SESSION OPTIONS:

SCAN AND ATTACKS TUNING:

ENDPOINT OPTIONS:

HTTP AND NETWORK OPTIONS:

OUTPUT OPTIONS:

REPORT OPTIONS:

OTHER OPTIONS:

TARGET SPECIFICATION

ATTACKS SPECIFICATION

PROXY AND AUTHENTICATION

SESSIONS

Since Wapiti 3.0.0, scanned URLs, discovered vulnerabilities and attacks status are stored in sqlite3 databases used as Wapiti session files.
Default behavior when a previous scan session exists for the given base URL and scope is to resume the scan and attack status.
Following options allows you to bypass this behavior/

SCAN AND ATTACKS TUNING

ENDPOINT OPTIONS

Some attack modules are using an HTTP endpoint to check for vulnerabilities.
For example the SSRF module inject the endpoint URL into webpage arguments to check if the target script try to fetch that URL.
Default HTTP endpoint is http://wapiti3.ovh/. Keep in mind that the target and your computer must be able to join that endpoint for the module to work.
On internal pentests this endpoint may not be accessible to the target hence you may prefer to set up your own endpoint.

HTTP AND NETWORK OPTIONS

OUTPUT OPTIONS

Wapiti prints its status to standard output. The two following options allow to tune the output.

REPORT OPTIONS

Wapiti will generate a report at the end of the attack process. Several formats of reports are available.

OTHER OPTIONS

LICENSE

Wapiti is covered by the GNU General Public License (GPL), version 2. Please read the LICENSE file for more information.

Copyright (c) 2006-2022 Nicolas Surribas.

AUTHORS

Nicolas Surribas is the main author, but the whole list of contributors is found in the separate AUTHORS file.

WEBSITE

https://wapiti-scanner.github.io/

BUG REPORTS

If you find a bug in Wapiti please report it to https://github.com/wapiti-scanner/wapiti/issues

SEE ALSO

The INSTALL.md file that comes with Wapiti contains every information required to install Wapiti.

  1. October 2022
  2. wapiti(1)