N-Stalker Web Application Security Scanner

N-Stalker Web Application Security Scanner无限制版本是一套专门供WEB安全研究顾问针对Web安全评估的解决方案, 集成了著名的N-Stealth Http Security Scanner引擎和高达39000个Web攻击签名数据库,以及申请专利的面向组件Web应用程序安全评估技术. N-Stalker可以说是开发人员,系统安全管理人员,IT审计人员必备的安全工具.可以检测出包括Code Injection, Cross-Site Scripting, OWASP Top10, Web Server Vulnerabilities, 3rd-party Packages Vulnerabilities等的众多漏洞威胁:

  1. Custom Design Errors
    Cross-site Script Injection Module 跨站脚本注入
  • Database Tampering – SQL Injection Module, including:

o Direct mode

o Blind mode

  • Buffer & Integer Overflow attack Module
  • Format String attack Module
  • File & Directories Tampering Module
  • Parameter Tampering Module, including:
  • Special Parameter Addition attacks
  • LDAP, XPath, XQuery injections
  • Boolean Parameter Tampering attacks
  • Hidden Parameter Discovery
  • Parameter Deletion attacks
  • Remote Execution attacks
  • File & Directory traversal attacks
  • Header Splitting & CRLF Injection attacks
  • Remote File Include PHP-based attacks
  1. Web Server Exposure

Web Server Infrastructure Analysis Module, including:

o Web Server version vulnerabilities

  • SSL encryption and x.509 certificate vulnerabilities
  • HTTP Method Discovery Module
  • HTTP Fingerprint Module, including:

o Web Server Fingerprint Module

o Web Server technology Discovery Module

  • Directory Brute-Force
  • HTTP Protocol vulnerabilities

3.Web Signature Attacks (39,000 attack database)

Web Attack Signatures Module, including:

o IIS CGI Decode Test

o IIS Extended Unicode Test

o IIS File Parsing Test

o FrontPage Security Test

o Lotus Domino Security Test

o General CGI Security Test

o HTTP Devices Security Test (routers, switches)

o Windows-based CGI Security Test

o PHP Web Application Security Test

o ASP Web Application Security Test

o J2EE Web Application Security Test

o Coldfusion Web Application Security Test

  • Attack templates such as:

o Complete, SANS/FBI Top10, Top20

  1. Confidentiality Exposure Checks

Look for Web forms vulnerabilities, including:

o Password cache feature

o Insecure method for sending data

o Lack of Encryption for sensitive data

o Insecure location to send data (leakage)

  • Information Leakage module, including:

o Find directory listing

o Find available objects to download

o Find meta-tag leakage

o Find sensitive keywords in comments and scripts

  • Compliance analysis, including:

o Find Copyright statements

o Find content rating statements

o Find custom content on web pages and forms

  1. Cookie Exposure Checks

Cookie Security Analysis Module, including:

o Find weakness in cookie information

o Find cookies sent without encryption

o Find information leakage in cookie information

o Find cookies vulnerable to malicious client-side script

  1. File & Directory Exposure Checks

Search for backup files

  • Search for information leakage files
  • Search for configuration files
  • Search for password files