19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 20 n A Web Application Hacker’s Toolkit 781<br />

require intelligent human involvement to understand <strong>the</strong> requirements, configure<br />

<strong>the</strong> testing tools appropriately, and monitor <strong>the</strong>ir performance.<br />

Current Products<br />

The market for automated <strong>web</strong> scanners has thrived in recent years, with a great<br />

deal of innovation and a wide range of different products. Here are some of <strong>the</strong><br />

more prominent scanners:<br />

n Acunetix<br />

n AppScan<br />

n Burp Scanner<br />

n Hailstorm<br />

n NetSparker<br />

n N-Stalker<br />

n NTOSpider<br />

n Skipfish<br />

n WebInspect<br />

Although most mature scanners share a common core of functionality, <strong>the</strong>y<br />

have differences in <strong>the</strong>ir approaches to detecting different areas of vulnerabilities<br />

and in <strong>the</strong> functionality presented to <strong>the</strong> user. Public discussions about<br />

<strong>the</strong> merits of different scanners often degenerate into mudslinging between<br />

vendors. Various surveys have been performed to evaluate <strong>the</strong> performance of<br />

different scanners in detecting different types of security flaws. Such surveys<br />

always involve running <strong>the</strong> scanners against a small sample of vulnerable code.<br />

This may limit <strong>the</strong> extrapolation of <strong>the</strong> results to <strong>the</strong> wide range of real-world<br />

situations in which scanners may be used.<br />

The most effective surveys run each scanner against a wide range of sample<br />

code that is derived from real-world <strong>application</strong>s, without giving vendors an<br />

opportunity to adjust <strong>the</strong>ir product to <strong>the</strong> sample code before <strong>the</strong> analysis. One<br />

such academic study by <strong>the</strong> University of California, Santa Barbara, claims to<br />

be “<strong>the</strong> largest evaluation of <strong>web</strong> <strong>application</strong> scanners in terms of <strong>the</strong> number<br />

of tested tools ... and <strong>the</strong> class of vulnerabilities analyzed.” You can download<br />

<strong>the</strong> report from <strong>the</strong> study at <strong>the</strong> following URL:<br />

www.cs.ucsb.edu/~adoupe/static/black-box-scanners-dimva2010.pdf

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!