{"id":1797,"date":"2009-05-18T09:00:21","date_gmt":"2009-05-18T09:00:21","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=1797"},"modified":"2015-09-09T19:38:04","modified_gmt":"2015-09-09T11:38:04","slug":"samurai-web-testing-framework-06-released-web-application-security-livecd","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2009\/05\/samurai-web-testing-framework-06-released-web-application-security-livecd\/","title":{"rendered":"Samurai Web Testing Framework 0.6 Released – Web Application Security LiveCD"},"content":{"rendered":"
[ad]<\/p>\n
You may remember we wrote about Samurai being released back in November 2008<\/a>, it’s been quite a while since the last update.<\/p>\n The authors have updated and fixed a number of issues with the environment as well as improved performance of the java based tools. They have also included a virtual machine of the environment. This VM requires VMWare.<\/p>\n For those that don’t know, Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. There are tools used in all four steps of a web pen-test.<\/p>\n Starting with reconnaissance, we have included tools such as the Fierce domain scanner<\/a> and Maltego. For mapping, we have included tools such WebScarab<\/a> and ratproxy<\/a>. We then chose tools for discovery. These would include w3af<\/a> and burp<\/a>. For exploitation, the final stage, we included BeEF<\/a>, AJAXShell and much more. This CD also includes a pre-configured wiki, set up to be the central information store during your pen-test.<\/p>\n You can download SamuraiWTF 0.6 here:<\/p>\n