How to Install and Uninstall wapiti Package on Ubuntu 16.04 LTS (Xenial Xerus)
Last updated: November 22,2024
1. Install "wapiti" package
Please follow the step by step instructions below to install wapiti on Ubuntu 16.04 LTS (Xenial Xerus)
$
sudo apt update
Copied
$
sudo apt install
wapiti
Copied
2. Uninstall "wapiti" package
Please follow the instructions below to uninstall wapiti on Ubuntu 16.04 LTS (Xenial Xerus):
$
sudo apt remove
wapiti
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the wapiti package on Ubuntu 16.04 LTS (Xenial Xerus)
Package: wapiti
Priority: optional
Section: universe/python
Installed-Size: 886
Maintainer: Ubuntu Developers
Original-Maintainer: Gianfranco Costamagna
Architecture: all
Version: 2.3.0+dfsg-4
Depends: libjs-jquery, python-beautifulsoup, python-requests, python:any (<< 2.8), python:any (>= 2.7.5-5~)
Filename: pool/universe/w/wapiti/wapiti_2.3.0+dfsg-4_all.deb
Size: 161360
MD5sum: dfe965b6989f332e146268c78ff2eca1
SHA1: 31c5ba6d49f06feca3bdb1b0187b1b9408a9cf3a
SHA256: 14dd73b321969307df4de8d3f078721c1cc0c30dc8f425c42bb2d6c829f11a63
Description-en: web application vulnerability scanner
Wapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of the
application but will scan the web pages of the deployed web applications,
looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see
if a script is vulnerable.
.
Wapiti can detect the following vulnerabilities:
- file handling errors (local and remote include/require, fopen,
readfile...)
- database injection (PHP/JSP/ASP SQL Injections and XPath Injections)
- XSS (Cross Site Scripting) injection
- LDAP injection
- command execution detection (eval(), system(), passtru()...)
- CRLF injection (HTTP response splitting, session fixation...)
Description-md5: 90c89d589386d740f9de60fecf3a5d67
Homepage: http://wapiti.sourceforge.net/
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Origin: Ubuntu
Priority: optional
Section: universe/python
Installed-Size: 886
Maintainer: Ubuntu Developers
Original-Maintainer: Gianfranco Costamagna
Architecture: all
Version: 2.3.0+dfsg-4
Depends: libjs-jquery, python-beautifulsoup, python-requests, python:any (<< 2.8), python:any (>= 2.7.5-5~)
Filename: pool/universe/w/wapiti/wapiti_2.3.0+dfsg-4_all.deb
Size: 161360
MD5sum: dfe965b6989f332e146268c78ff2eca1
SHA1: 31c5ba6d49f06feca3bdb1b0187b1b9408a9cf3a
SHA256: 14dd73b321969307df4de8d3f078721c1cc0c30dc8f425c42bb2d6c829f11a63
Description-en: web application vulnerability scanner
Wapiti allows you to audit the security of your web applications.
It performs "black-box" scans, i.e. it does not study the source code of the
application but will scan the web pages of the deployed web applications,
looking for scripts and forms where it can inject data.
Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see
if a script is vulnerable.
.
Wapiti can detect the following vulnerabilities:
- file handling errors (local and remote include/require, fopen,
readfile...)
- database injection (PHP/JSP/ASP SQL Injections and XPath Injections)
- XSS (Cross Site Scripting) injection
- LDAP injection
- command execution detection (eval(), system(), passtru()...)
- CRLF injection (HTTP response splitting, session fixation...)
Description-md5: 90c89d589386d740f9de60fecf3a5d67
Homepage: http://wapiti.sourceforge.net/
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Origin: Ubuntu