Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST so that pentesters will have more time to
The tool is highly configurable and anybody can trivially create simple plugins or add new tests in the configuration files without having any development experience.
Note: This tool is however not a silverbullet and will only be as good as the person using it: Understanding and experience will be required to correctly interpret tool output and decide what to investigate further in order to demonstrate impact.
OWTF is developed on KaliLinux and macOS but it is made for Kali Linux (or other Debian derivatives)
OWTF supports both Python2 and Python3.
Recommended:
Using a virtualenv is highly recommended!
pip install git+https://github.com/owtf/owtf#egg=owtf
or clone the repo and python setup.py install
To run OWTF on Windows or MacOS, use the Dockerfile (requires Docker installed) provided to try OWTF:
make docker-build
make docker-run
~/.owtf/conf
and change SERVER_ADDR: 127.0.0.1
to SERVER_ADDR: 0.0.0.0
.virtualenv env
and activate it source env/bin/activate
. $ cd owtf/
# Install the develop version, so that any change made is instantly reflected.
$ python setup.py develop
# Run OWTF!
$ python -m owtf
localhost:8009
for OWTF web interface.Dependencies: Install homebrew (https://brew.sh/) and follow the steps given below:
$ virtualenv <venv name>
$ source <venv name>/bin/activate
$ brew install coreutils gnu-sed openssl
# We need to install 'cryptography' first to avoid issues
$ pip install cryptography --global-option=build_ext --global-option="-L/usr/local/opt/openssl/lib" --global-option="-I/usr/local/opt/openssl/include"
$ git clone <this repo>
$ cd owtf
$ python setup.py install
# Run OWTF!
$ python -m owtf
In order to run the tools, install them and point the OWTF config ~/.owtf/conf/general.cfg
to the correct locations.
Resilience: If one tool crashes OWTF, will move on to the next tool/test, saving the partial output of the tool until it crashed.
Flexibile: Pause and resume your work.
Tests Separation: OWTF separates its traffic to the target into mainly 3 types of plugins:
Extensive REST API.
Has almost complete OWASP Testing Guide(v3, v4), Top 10, NIST, CWE coverage.
Web interface: Easily manage large penetration engagements easily.
Interactive report:
Checkout LICENSE
#project-owtf