Overview
The/web command performs security scanning on web applications to detect OWASP Top 10 vulnerabilities. It’s an alias for /raptor-web and provides automated web application security testing.
Syntax
Parameters
Full URL of the web application to scan (e.g., https://example.com)
Authentication token for authenticated scanning (e.g., Bearer token)
Maximum depth for web crawler (default: 3)
Maximum number of pages to scan
What It Does
- Crawls the target web application
- Identifies injection points and attack surfaces
- Tests for OWASP Top 10 vulnerabilities
- Generates detailed vulnerability reports
- Provides remediation guidance
Examples
Basic Web Scan
Authenticated Scan
Limited Scope Scan
Vulnerability Types Detected
- Injection: SQL injection, command injection, LDAP injection
- Broken Authentication: Session management issues
- Sensitive Data Exposure: Unencrypted data transmission
- XML External Entities (XXE): XML parsing vulnerabilities
- Broken Access Control: Authorization bypass
- Security Misconfiguration: Server misconfigurations
- Cross-Site Scripting (XSS): Reflected, stored, DOM-based
- Insecure Deserialization: Object injection
- Using Components with Known Vulnerabilities: Outdated libraries
- Insufficient Logging & Monitoring: Security logging gaps
Output Structure
Use Cases
- Web application security auditing
- OWASP Top 10 compliance testing
- Pre-production security validation
- Bug bounty reconnaissance
Ethical Usage
Related Commands
/scan
Static analysis for source code
/validate
Validate exploitability of findings
/exploit
Generate exploit PoCs
/patch
Generate security patches
Notes
- This command is currently in alpha development
- Results are saved to
out/web_scan_<timestamp>/ - For defensive security research and authorized testing only
- Always follow responsible disclosure practices