SlideShare a Scribd company logo
1
Scanning for Web Vulnerabilities
By
Hacking Spot
2
• Precisely document what a tool class
does and does not do
• Inform users
– Match the tool to a particular situation
– Understand significance of tool results
• Provide feedback to tool developers
Purpose of Tool Evaluations
3
• Select class of tool
• Develop clear (testable) requirements
– Tool functional specification aided by focus groups
– Spec posted for public comment
• Develop a measurement methodology
– Develop reference datasets (test cases)
– Document interpretation criteria
Details of Tool Evaluations
4
• Static Analysis Security Tools
• Web Application Vulnerability Tools
• Binary Analysis Tools
• Web Services Tools
• Network Scanner Tools
Some Tools for specific application*
5
• Firewall
• Intrusion Detection/Prevention System
• Virus Detection
• Fuzzers
• Web Proxy Honeypots
• Blackbox Pen Tester
Other Types of Software Assurance
Security Tools *
6
• Life Cycle Process (requirements, design, …)
• Automation (manual, semi, automatic)
• Approach (preclude, detect, mitigate, react,
appraise)
• Viewpoint (blackbox, whitebox (static, dynamic))
• Other (price, platform, languages, …)
How to Classify Tools and Techniques
7
The Rise of Web App Vulnerability
0
5
10
15
20
25
2000 2001 2002 2003 2004 2005 2006
Remote file
inclusion
SQL
injection
Cross-site
scripting
Top web app vulnerabilities as % of total vulnerabilities in NVD
8
is software which communicates with a web
application through the web front-end and
identifies potential security weaknesses in the
web application.*
Web Application Security Scanner
9
Web Application Architecture
Database Server
Client (Browser,
Tool, etc.)
HTTP
Requests
HTML, etc.
Webapp
Web Server
10
- Client and Server Interaction
- Distributed n-tiered architecture
- Remote access
- Heterogeneity
- Content delivery via HTTP
- Concurrency
- Session management
- Authentication and authorization
Characteristics of Web Application
11
- Limited to tools that examine software applications on
the web.
- Does not apply to tools that scan other artifacts, like
requirements, byte-code, or binary code
- Does not apply to database scanners
- Does not apply to other system security tools, e.g.,
firewalls, anti-virus, gateways, routers, switches,
intrusion detection system
Scope – What types of tools does this
spec NOT address?
12
- Cross-Site Scripting (XSS)
- Injection flaws
- Authentication and access control weaknesses
- Path manipulation
- Improper Error Handling
Some Vulnerabilities that Web
Application Scanners Check
13
- AppScan DE by Watchfire, Inc. (IBM)
- WebInpect by SPI-Dynamics (HP)
- Acunetix WVS by Acunetix
- Hailstorm by Cenzic, Inc.
- W3AF, Grabber, Paros, etc.
- others…
Some Web Application Security
Scanning Tools
14
• What is a common set of functions?
• Can they be tested?
• How can one measure the
effectiveness?
HackingSpot is “neutral”, not consumer reports, and
does not endorse products.
Establishing a Framework to Compare
15
• Precisely document what a tool class does and does
not do
• Provide feedback to tool developers
• Inform users
• Match the tool to a particular situation
• Understand significance of tool results
Purpose of a Specification
16
• Specifies basic (minimum) functionality
• Defines features unambiguously
• Represents a consensus on tool functions and
requirements
• Serves as a guide to measure the capability of tools
How should this spec be viewed?
17
• Not to prescribe the features and functions that all
web application scanner tools must have.
• Use of a tool that complies with this specification
does not guarantee the application is free of
vulnerabilities.
• Production tools should have capabilities far beyond
those indicated.
• Used as the basis for developing test suites to
measure how a tool meets these requirements.
How should this spec be used?
18
• Found in existing applications today
• Recognized by tools today
• Likelihood of exploit or attack is medium to
high
Criteria for selection of Web Application
Vulnerabilities
19
• OWASP Top Ten 2007
• WASC Threat Classification
• CWE – 600+ weaknesses definition dictionary
• CAPEC- 100+ attack patterns for known
exploits
Web Application Vulnerabilities
20
• Test applications that model real security
features and vulnerabilities
• Configurable to be vulnerable to one or many
types of attack
• Ability to provide increasing level of defense
for a vulnerability
Test Suites
21
Defense Mechanisms
• Different programmers use different defenses
• Defenses/Filters are not all equivalent
• We have different instances of vulnerabilities:
levels of defense
22
• Example: Cross-Site Request Forgeries
Levels of Defense
Untrusted.c0m
MyShopping.Com
CSRF
ScriptUntrusted.c0m redirects to MyShopping.Com
GET /shop.aspx?ItemID=42&Accept=Yes
Thanks For Buying
This Item!
“This nice new website:
Untrusted.c0m”
23
• Example: Cross-Site Request Forgeries
- Level 0: No Protection (bad)
- Level 1: Using only POST (well...)
- Level 2: Checking the referrer (better but
referrer may be spoofed)
- Level 3: Using a nonce (good)
• Higher level means harder to break
Levels of Defense
24
Web Server Database Server
Web Application
Scanner Tool
Attacks
HTML, etc.
Webapp
Tool
Report Seeded
Vulns.
Cheat sheet
?
25
Attacks Analysis
• An action that exploits a vulnerability
• What exactly is the tool testing?
• What do I need to test in my application?
• Do the results match?
26
Web Server Database Server
Web Application
Scanner Tool
Attacks
HTML, etc.
Webapp
Tool
Report
Attacks
Analysis
Seeded
Vulns.?
27
• Test Suite with 21 vulnerabilities (XSS, SQL
Injection, File Inclusion)
– PHP, MySQL, Ajax
– LAMP
• 4 Scanners (Commercial and Open Source)
• One type of vulnerability at the time
• Results (Detection rate, False-Positive rate)
Test Suite Evaluation
28
• Tools are limited in scope (companies sell service as
opposed to selling tool)
• Speed versus Depth (in-depth testing takes time)
• Difficult to read output reports (typically log files)
• False-Positives
• Tuning versus default mode
Issues with Web Application Scanner
Tools
Thank You
29

More Related Content

PPT
Application Security
PDF
Secure Design: Threat Modeling
PPTX
Application security
PPT
Penetration Testing Basics
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Vulnerabilities in modern web applications
PPTX
Cyber kill chain
PPTX
Secure Software Development Lifecycle
 
Application Security
Secure Design: Threat Modeling
Application security
Penetration Testing Basics
Application Security | Application Security Tutorial | Cyber Security Certifi...
Vulnerabilities in modern web applications
Cyber kill chain
Secure Software Development Lifecycle
 

What's hot (20)

PPTX
Web application security
PDF
Threat Intelligence
PPTX
Secure Software Development Life Cycle
PPTX
Cyber Security roadmap.pptx
PDF
Global Cyber Threat Intelligence
PPTX
Intro to Security in SDLC
PDF
Security testing presentation
PDF
Threat Hunting
PPTX
Vulnerability and Assessment Penetration Testing
PPTX
Penetration Testing
PDF
Elastic SIEM (Endpoint Security)
PPTX
Design of security architecture in Information Technology
PPTX
WTF is Penetration Testing v.2
PPTX
Vapt( vulnerabilty and penetration testing ) services
PDF
Web Application Security and Awareness
PPTX
Cyber Threat Modeling
PPTX
Network traffic analysis with cyber security
PDF
Introduction to Cybersecurity
PDF
Malware classification and detection
Web application security
Threat Intelligence
Secure Software Development Life Cycle
Cyber Security roadmap.pptx
Global Cyber Threat Intelligence
Intro to Security in SDLC
Security testing presentation
Threat Hunting
Vulnerability and Assessment Penetration Testing
Penetration Testing
Elastic SIEM (Endpoint Security)
Design of security architecture in Information Technology
WTF is Penetration Testing v.2
Vapt( vulnerabilty and penetration testing ) services
Web Application Security and Awareness
Cyber Threat Modeling
Network traffic analysis with cyber security
Introduction to Cybersecurity
Malware classification and detection
Ad

Similar to Scanning web vulnerabilities (20)

PDF
Web Applications Assessment Tools: Comparison and Discussion
PPTX
Project Presentation
PPTX
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-...
PDF
Strategies for Web Application Security
PDF
Strategies for Web Application Security
DOC
Semi-Automated Security Testing of Web applications
PPTX
Application security in a hurry webinar
PDF
Web Application Security: Introduction to common classes of security flaws an...
PDF
Tw noche geek quito webappsec
PDF
Essentials of Web Application Security: what it is, why it matters and how to...
PPTX
Web applications security conference slides
PPTX
Web Application Scanning Flow and features.pptx
PPT
Web 2.0 Hacking
PPTX
Web application vulnerability assessment
PPTX
Web application Security tools
PDF
Practical White Hat Hacker Training - Vulnerability Detection
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
PDF
Web application penetration testing lab setup guide
PDF
ProActive Security
Web Applications Assessment Tools: Comparison and Discussion
Project Presentation
Why Johnny Still Can’t Pentest: A Comparative Analysis of Open-source Black-...
Strategies for Web Application Security
Strategies for Web Application Security
Semi-Automated Security Testing of Web applications
Application security in a hurry webinar
Web Application Security: Introduction to common classes of security flaws an...
Tw noche geek quito webappsec
Essentials of Web Application Security: what it is, why it matters and how to...
Web applications security conference slides
Web Application Scanning Flow and features.pptx
Web 2.0 Hacking
Web application vulnerability assessment
Web application Security tools
Practical White Hat Hacker Training - Vulnerability Detection
Web App Security Presentation by Ryan Holland - 05-31-2017
Web application penetration testing lab setup guide
ProActive Security
Ad

More from Mohit Dholakiya (6)

PDF
Data science
PDF
Vulnerability
PDF
Cyber laws
PDF
How to grow on you tube
PPTX
Instagram strategies
PDF
Cyber ethics
Data science
Vulnerability
Cyber laws
How to grow on you tube
Instagram strategies
Cyber ethics

Recently uploaded (20)

PPT
Mechanical Engineering MATERIALS Selection
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Lecture Notes Electrical Wiring System Components
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
UNIT 4 Total Quality Management .pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
composite construction of structures.pdf
PPT
Project quality management in manufacturing
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mechanical Engineering MATERIALS Selection
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Internet of Things (IOT) - A guide to understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Foundation to blockchain - A guide to Blockchain Tech
additive manufacturing of ss316l using mig welding
Lecture Notes Electrical Wiring System Components
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
CYBER-CRIMES AND SECURITY A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Arduino robotics embedded978-1-4302-3184-4.pdf
Digital Logic Computer Design lecture notes
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
UNIT 4 Total Quality Management .pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
composite construction of structures.pdf
Project quality management in manufacturing
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx

Scanning web vulnerabilities

  • 1. 1 Scanning for Web Vulnerabilities By Hacking Spot
  • 2. 2 • Precisely document what a tool class does and does not do • Inform users – Match the tool to a particular situation – Understand significance of tool results • Provide feedback to tool developers Purpose of Tool Evaluations
  • 3. 3 • Select class of tool • Develop clear (testable) requirements – Tool functional specification aided by focus groups – Spec posted for public comment • Develop a measurement methodology – Develop reference datasets (test cases) – Document interpretation criteria Details of Tool Evaluations
  • 4. 4 • Static Analysis Security Tools • Web Application Vulnerability Tools • Binary Analysis Tools • Web Services Tools • Network Scanner Tools Some Tools for specific application*
  • 5. 5 • Firewall • Intrusion Detection/Prevention System • Virus Detection • Fuzzers • Web Proxy Honeypots • Blackbox Pen Tester Other Types of Software Assurance Security Tools *
  • 6. 6 • Life Cycle Process (requirements, design, …) • Automation (manual, semi, automatic) • Approach (preclude, detect, mitigate, react, appraise) • Viewpoint (blackbox, whitebox (static, dynamic)) • Other (price, platform, languages, …) How to Classify Tools and Techniques
  • 7. 7 The Rise of Web App Vulnerability 0 5 10 15 20 25 2000 2001 2002 2003 2004 2005 2006 Remote file inclusion SQL injection Cross-site scripting Top web app vulnerabilities as % of total vulnerabilities in NVD
  • 8. 8 is software which communicates with a web application through the web front-end and identifies potential security weaknesses in the web application.* Web Application Security Scanner
  • 9. 9 Web Application Architecture Database Server Client (Browser, Tool, etc.) HTTP Requests HTML, etc. Webapp Web Server
  • 10. 10 - Client and Server Interaction - Distributed n-tiered architecture - Remote access - Heterogeneity - Content delivery via HTTP - Concurrency - Session management - Authentication and authorization Characteristics of Web Application
  • 11. 11 - Limited to tools that examine software applications on the web. - Does not apply to tools that scan other artifacts, like requirements, byte-code, or binary code - Does not apply to database scanners - Does not apply to other system security tools, e.g., firewalls, anti-virus, gateways, routers, switches, intrusion detection system Scope – What types of tools does this spec NOT address?
  • 12. 12 - Cross-Site Scripting (XSS) - Injection flaws - Authentication and access control weaknesses - Path manipulation - Improper Error Handling Some Vulnerabilities that Web Application Scanners Check
  • 13. 13 - AppScan DE by Watchfire, Inc. (IBM) - WebInpect by SPI-Dynamics (HP) - Acunetix WVS by Acunetix - Hailstorm by Cenzic, Inc. - W3AF, Grabber, Paros, etc. - others… Some Web Application Security Scanning Tools
  • 14. 14 • What is a common set of functions? • Can they be tested? • How can one measure the effectiveness? HackingSpot is “neutral”, not consumer reports, and does not endorse products. Establishing a Framework to Compare
  • 15. 15 • Precisely document what a tool class does and does not do • Provide feedback to tool developers • Inform users • Match the tool to a particular situation • Understand significance of tool results Purpose of a Specification
  • 16. 16 • Specifies basic (minimum) functionality • Defines features unambiguously • Represents a consensus on tool functions and requirements • Serves as a guide to measure the capability of tools How should this spec be viewed?
  • 17. 17 • Not to prescribe the features and functions that all web application scanner tools must have. • Use of a tool that complies with this specification does not guarantee the application is free of vulnerabilities. • Production tools should have capabilities far beyond those indicated. • Used as the basis for developing test suites to measure how a tool meets these requirements. How should this spec be used?
  • 18. 18 • Found in existing applications today • Recognized by tools today • Likelihood of exploit or attack is medium to high Criteria for selection of Web Application Vulnerabilities
  • 19. 19 • OWASP Top Ten 2007 • WASC Threat Classification • CWE – 600+ weaknesses definition dictionary • CAPEC- 100+ attack patterns for known exploits Web Application Vulnerabilities
  • 20. 20 • Test applications that model real security features and vulnerabilities • Configurable to be vulnerable to one or many types of attack • Ability to provide increasing level of defense for a vulnerability Test Suites
  • 21. 21 Defense Mechanisms • Different programmers use different defenses • Defenses/Filters are not all equivalent • We have different instances of vulnerabilities: levels of defense
  • 22. 22 • Example: Cross-Site Request Forgeries Levels of Defense Untrusted.c0m MyShopping.Com CSRF ScriptUntrusted.c0m redirects to MyShopping.Com GET /shop.aspx?ItemID=42&Accept=Yes Thanks For Buying This Item! “This nice new website: Untrusted.c0m”
  • 23. 23 • Example: Cross-Site Request Forgeries - Level 0: No Protection (bad) - Level 1: Using only POST (well...) - Level 2: Checking the referrer (better but referrer may be spoofed) - Level 3: Using a nonce (good) • Higher level means harder to break Levels of Defense
  • 24. 24 Web Server Database Server Web Application Scanner Tool Attacks HTML, etc. Webapp Tool Report Seeded Vulns. Cheat sheet ?
  • 25. 25 Attacks Analysis • An action that exploits a vulnerability • What exactly is the tool testing? • What do I need to test in my application? • Do the results match?
  • 26. 26 Web Server Database Server Web Application Scanner Tool Attacks HTML, etc. Webapp Tool Report Attacks Analysis Seeded Vulns.?
  • 27. 27 • Test Suite with 21 vulnerabilities (XSS, SQL Injection, File Inclusion) – PHP, MySQL, Ajax – LAMP • 4 Scanners (Commercial and Open Source) • One type of vulnerability at the time • Results (Detection rate, False-Positive rate) Test Suite Evaluation
  • 28. 28 • Tools are limited in scope (companies sell service as opposed to selling tool) • Speed versus Depth (in-depth testing takes time) • Difficult to read output reports (typically log files) • False-Positives • Tuning versus default mode Issues with Web Application Scanner Tools

Editor's Notes