Top Banner
CHOOSING THE BEST WEB APP SECURITY SCANNER
24
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

CHOOSING THE BEST WEB APP SECURITY SCANNER

Page 2: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

WHO AM I ?

Chirita Ionel

Application Security Analyst @

OWASP Chapter board member

Page 3: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

WHAT DO WE WANT FROM A SCANNER? Wide Coverage

Fast scans

Low number of false positives

Low number of false negatives

Scalability

Easy to use

Permanent vulnerability database updates

To be Cheap !?

Page 4: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

W.A.S. EVALUATION CRITERIA Hardware Requirements & support

Protocol support

Authentication

Session management

Crawling

Data Parsing

Testing

Command and control

Reporting

Page 5: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

HARDWARE REQUIREMENTS & SUPPORT

Thick client vs cloud

Page 6: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

PROTOCOL SUPPORTTransport support

HTTP1.0 & HTTP1.1

SSL/TLS

HTTP keep alive

HTTP compression

HTTP user agent configuration

Proxy support

HTTP1.0 & HTTP1.1 proxy

Socks 4 proxy

Socks 5 proxy

PAC file support

Page 7: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

AUTHENTICATION Basic

Digest

HTTP negotiate – NTLM & Kerberos

Html form-based Automated Scripted Non-automated

Single sign on

Client SSL certificates

Other

Page 8: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

SESSION MANAGEMENT Session management capabilities

Start a new session Detect if the session is expired Reacquire session token

Session management token type support HTTP cookies HTTP parameters HTTP URL path

Session token detection

Session token refresh policy

Page 9: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

CRAWLING Define starting URL

Define additional hostname or exclusions for specific criteria

Support automated from submission

Detect error pages and custom 404 pages

Redirect support

Page 10: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

DATA PARSING HTML

JavaScript

VBScript

XML

Plaintext

ActiveX Objects

Flash

Page 11: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

TESTING

Page 12: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

COMMAND AND CONTROL Schedule scans

Pause / resume

Real-time status of running scans

Run multiple scans simultaneously

GUI, CLI and web based interface

Extensibility & interoperability

Page 13: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

REPORTING Executive summary

Technical detailed report

Delta reports

Compliance report

Customization

Report data file format

Page 14: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

SO YOU SHOULD JUST USE THE BEST SCANNER, RIGHT? Why do you mean by “best” ?

Or the cheapest ?

Page 15: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

By Larry Suto

Page 16: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

WHAT ABOUT …

… running each vendor's scanner against each of the vendor's test sites and comparing the results

Page 17: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

SUMMARY OF RESULTS

Acunetix

IBM Appscan

BurpSuite

Hailstorm

NTOSpider

Qualys

HP Webinspect

0 20 40 60 80 100 120

Falsely Reported and Missed Vulnerabilitites

False Negative False Positive

Acunetix

IBM Appscan

BurpSuite

Hailstorm

NTOSpider

Qualys

HP Webinspect

0 20 40 60 80 100 120 140 160

Vulnerability Findings

Trained Point & Shoot

Page 18: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

SUMMARY OF RESULTS

Acune

tix

IBM A

ppsc

an

BurpS

uite

Hailst

orm

NTOSp

ider

Qualys

HP W

ebinsp

ect

0

20

40

60

80

100

120

140

160

Vuln's Found Vuln's Missed FP's Reported

Page 19: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

CASE STUDY

By Chirita Ionel

Page 20: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

FP's Rported

0 1 2 3 4 5 6 7 8 9

FP's reported

IBM Qualys WebInspectVeracode Acunetix

Vuln's Found

0 1 2 3 4 5 6 7 8 9 10

Vuln's Found

IBM Qualys WebInspectVeracode Acunetix

Page 21: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

Scan Time

0 1 2 3 4 5 6 7 8 9 10

Scan Time

IBM Qualys WebInspectVeracode Acunetix

Stability

0 1 2 3 4 5 6 7 8 9 10

Stability

IBM Qualys WebInspectVeracode Acunetix

Page 22: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

ON TOP OF ALL -> GARTNER MAGIC QUADRANT

Page 23: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.
Page 24: Chirita Ionel  Application Security Analyst @  OWASP Chapter board member.

SO ?