1 / 13

CAP6135 – Malware and Software Vulnerability Analysis

A n Analysis of Web Application Vulnerability Scanners. By Tara Lingle and Orcun Tagtekin. CAP6135 – Malware and Software Vulnerability Analysis. Background. Web Application Vulnerability Scanning searches for software vulnerabilities within web applications:

soleil
Télécharger la présentation

CAP6135 – Malware and Software Vulnerability Analysis

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An Analysis of Web Application Vulnerability Scanners By Tara Lingle and OrcunTagtekin CAP6135 – Malware and Software Vulnerability Analysis

  2. Background • Web Application Vulnerability Scanning searches for software vulnerabilities within web applications: • Web Application Security (Scripting issues) • Technical Vulnerabilities (Cross-site Scripting) • Security Vulnerabilities (Denial of Service) • Architectural/Logical Vulnerabilities (Information Leakage) • Can be used to help identify potential security vulnerabilities within commercial and proprietary based web applications. • Frequently used in both the pre-deployment and post-deployment test cycles. CAP6135 – Malware and Software Vulnerability Analysis

  3. Goal • The goal of this project is to explore both the commercial and open source web application vulnerability scanners that currently exist and determine which one(s) we would recommend to an organization. • Evaluate leading commercial products, to include features, strengths and weaknesses • Compare our findings with other research • Review a number of open source tools available • Decide how the commercial products compare against the open source tools CAP6135 – Malware and Software Vulnerability Analysis

  4. What would an organization look for in such a product? CAP6135 – Malware and Software Vulnerability Analysis

  5. Requirements Statement (Wish List) • Limited number of false positives and false negatives • Ability to customize configuration options for internal needs • Covers all major platforms (Java, JavaScript, PHP, ASP, ASP.NET), including dynamic content • Ease of use for non-security professionals • Powerful, automated scanning engine that can handle complexities by default (i.e. minimal manual intervention) CAP6135 – Malware and Software Vulnerability Analysis

  6. Requirements Statement (Wish List), cont. • Vendor Support • Tests both application vulnerabilities and known web server vulnerabilities • Usable reports and data • Maintenance/upgrade costs • Expandability for future needs of the organization • Can obtain periodic updates as new vulnerabilities are introduced CAP6135 – Malware and Software Vulnerability Analysis

  7. Top Rated Commercial Products • Acunetix Web Vulnerability Scanner by Acunetix • AppScan by IBM/Watchfire, Inc. • WebInspect by HP/SPI-Dynamics • Hailstorm by Cenzic CAP6135 – Malware and Software Vulnerability Analysis

  8. Product Comparison CAP6135 – Malware and Software Vulnerability Analysis

  9. Product Comparison, cont. CAP6135 – Malware and Software Vulnerability Analysis

  10. What about open source tools that exist for the same purpose? CAP6135 – Malware and Software Vulnerability Analysis

  11. Commercial Products vsOpen Source Tools • What are the trade-offs of using an open source tool over a commercial product? • Do any of them meet the requirements statement outlined?  CAP6135 – Malware and Software Vulnerability Analysis

  12. Free/Open Source Tools • Nikto by Sullo • Paros by Chinotec • WebScarab by Rogan Dawes • Grabber by Romain Gaucher • Grendel-Scan by David Byrne and Eric Duprey • Pantera by Simon Roses Femerling • Powerfuzzer by Marcin Kozlowski • Scuba by Imperva • Wapiti by Nicolas Surribas CAP6135 – Malware and Software Vulnerability Analysis

  13. So which product comes out on top and best meets the requirements statement? ? TBD CAP6135 – Malware and Software Vulnerability Analysis

More Related