On Tue, May 14, 2013 at 02:53:53PM -0300, Andres Riancho wrote: > List, > > I've developed a new w3af [0] plugin which uses ClamAV to find > malware on your site. The basic idea is that w3af will crawl your site > and send all http response bodies to clamd, and then report any > findings it returns. > > I need your help for testing! Follow these steps if you've got > some minutes to spare: > > git clone g...@github.com:andresriancho/w3af.git > cd w3af > git checkout feature/clam > git pull > ./w3af_console # Install the new clamd dependency using pip > > # Install clamd in your system (this is for ubuntu): > sudo apt-get install clamav-daemon clamav-freshclam clamav-unofficial-sigs > sudo freshclam > sudo service clamav-daemon start > > Then, run a scan against your site using the new grep.clamav > plugin. Remember that for the grep plugin to analyze your site, you > need to activate a crawl plugin like web_spider. If you want to test > with something "real", remember you can use the EICAR test binary[0] > > If you want to read the source for this mesh please see this [1] > link. Let me know if there is something I'm doing wrong with the > w3af-clamd integration! > > Happy testing! > > [0] http://www.eicar.org/85-0-Download.html > [1] > https://github.com/andresriancho/w3af/blob/feature/clam/plugins/grep/clamav.py > > Regards, > -- > Andrés Riancho > Project Leader at w3af - http://w3af.org/ > Web Application Attack and Audit Framework > Twitter: @w3af > GPG: 0x93C344F3
Excellent plugin. This is very useful for me and I will also recommend it to others. --- Henri Salo _______________________________________________ Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net http://www.clamav.net/support/ml