How to Install and Uninstall wapiti Package on Ubuntu 21.10 (Impish Indri)
Last updated: November 07,2024
1. Install "wapiti" package
In this section, we are going to explain the necessary steps to install wapiti on Ubuntu 21.10 (Impish Indri)
$
sudo apt update
Copied
$
sudo apt install
wapiti
Copied
2. Uninstall "wapiti" package
Please follow the step by step instructions below to uninstall wapiti on Ubuntu 21.10 (Impish Indri):
$
sudo apt remove
wapiti
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the wapiti package on Ubuntu 21.10 (Impish Indri)
Package: wapiti
Architecture: all
Version: 3.0.4+dfsg-1
Priority: optional
Section: universe/python
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 1582
Depends: libjs-jquery, python3-bs4, python3-importlib-metadata, python3-mako (>= 1.1.2), python3-markupsafe, python3-requests, python3-six (>= 1.15.0), python3-socks, python3-tld, python3-yaswfp, python3:any
Filename: pool/universe/w/wapiti/wapiti_3.0.4+dfsg-1_all.deb
Size: 317736
MD5sum: c77984283bf03267af06b9eff5704a02
SHA1: 9f6cf2113450e825ac3f493eda2bb26d403b6e9e
SHA256: cb57edf72a0257185455d3c36334654a2807aec55bad5b81d7259eed2ef322de
SHA512: 7f7841612bb2812182d9f2174510fbcc7283b613a4f8b247b600d4a5e03f3b3bb4afbda52de4f431fc586af0d6ee52cae35c89c29e8c6f8e6c5323fd06c7f8c6
Homepage: http://wapiti.sourceforge.net/
Description-en: web application vulnerability scanner
Wapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of the
application but will scan the web pages of the deployed web applications,
looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see
if a script is vulnerable.
.
Wapiti can detect the following vulnerabilities:
- Database Injection (PHP/ASP/JSP SQL Injections and XPath Injections)
- Cross Site Scripting (XSS) reflected and permanent
- File disclosure detection (local and remote include, require, fopen,
readfile...)
- Command Execution detection (eval(), system(), passtru()...)
- XXE (Xml eXternal Entity) injection
- CRLF Injection
- Search for potentially dangerous files on the server (thank to the Nikto db)
- Bypass of weak htaccess configurations
- Search for copies (backup) of scripts on the server
- Shellshock
- DirBuster like
- Server Side Request Forgery (through use of an external Wapiti website)
Description-md5: b13c5cbe215f396866461fbe6e26610d
Architecture: all
Version: 3.0.4+dfsg-1
Priority: optional
Section: universe/python
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Debian Security Tools
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 1582
Depends: libjs-jquery, python3-bs4, python3-importlib-metadata, python3-mako (>= 1.1.2), python3-markupsafe, python3-requests, python3-six (>= 1.15.0), python3-socks, python3-tld, python3-yaswfp, python3:any
Filename: pool/universe/w/wapiti/wapiti_3.0.4+dfsg-1_all.deb
Size: 317736
MD5sum: c77984283bf03267af06b9eff5704a02
SHA1: 9f6cf2113450e825ac3f493eda2bb26d403b6e9e
SHA256: cb57edf72a0257185455d3c36334654a2807aec55bad5b81d7259eed2ef322de
SHA512: 7f7841612bb2812182d9f2174510fbcc7283b613a4f8b247b600d4a5e03f3b3bb4afbda52de4f431fc586af0d6ee52cae35c89c29e8c6f8e6c5323fd06c7f8c6
Homepage: http://wapiti.sourceforge.net/
Description-en: web application vulnerability scanner
Wapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of the
application but will scan the web pages of the deployed web applications,
looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see
if a script is vulnerable.
.
Wapiti can detect the following vulnerabilities:
- Database Injection (PHP/ASP/JSP SQL Injections and XPath Injections)
- Cross Site Scripting (XSS) reflected and permanent
- File disclosure detection (local and remote include, require, fopen,
readfile...)
- Command Execution detection (eval(), system(), passtru()...)
- XXE (Xml eXternal Entity) injection
- CRLF Injection
- Search for potentially dangerous files on the server (thank to the Nikto db)
- Bypass of weak htaccess configurations
- Search for copies (backup) of scripts on the server
- Shellshock
- DirBuster like
- Server Side Request Forgery (through use of an external Wapiti website)
Description-md5: b13c5cbe215f396866461fbe6e26610d