{"id":3176,"date":"2011-09-15T17:25:29","date_gmt":"2011-09-15T16:25:29","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3176"},"modified":"2011-09-15T17:25:29","modified_gmt":"2011-09-15T16:25:29","slug":"lilith-web-application-security-audit-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2011\/09\/lilith-web-application-security-audit-tool\/","title":{"rendered":"Lilith – Web Application Security Audit Tool"},"content":{"rendered":"
LiLith is a tool written in Perl to audit web applications. This tool analyses webpages and looks for html form tags , which often refer to dynamic pages that might be subject to SQL injection<\/a> or other flaws. It works as an ordinary spider and analyses pages, following hyperlinks, injecting special characters that have a special meaning to any underlying platform.<\/p>\n Any Web applications scanner can never perform a full 100% correct audit. Therefore, a manual re-check is necessary. Hence, be aware that Lilith might come up with several false positives.<\/p>\n LiLith is a program that verifies the security of a web application. As a security consultant, the author often sees web applications that contain security flaws. A web application is a complex entity and cannot be fully checked with “just any tool”, therefor I recommend you to manually verify any results. <\/p>\n How the entire “scanning” process works is different from so called “CGI scanners”, such as nikto<\/a> and n-stealth. This program will surf to a website and crawls through all the links, just as a user would to. On any possible input field, such as text boxes, page id’s, … LiLith will attempt to inject any characters that might have a special meaning for any underlying technology such as SQL. <\/p>\n For more information, it is recommended to read the following white paper: web dissection using lilith<\/a>.<\/p>\n You can download Lilith here:<\/p>\n