IBM AppScan


WASC Classification

  1. Authentication
  2. Authorization
  3. Client Attack
  4. Command Execution
  5. Information Disclosure About System
  6. Logical Attack (Denial Of Service)

PAROS

SCAN - Intrusive

PROXY - Not Intrusive

Other non-intrusive:

  • Tamper
  • Force Browse
  • Directory
  • Validate

HTML5 Elements

article - Unrelated (independent) content

section - Related content

aside - Supplementary content

GlassBox Tests

GlassBox tests can detect the following:

  • Command Execution
  • Files Included
  • Connection Strings
  • MX Injection
  • XPATH Injection
  • LDAP Injection
  • Sink Calls (Class Library)

Report Output Types

You may output reports in the following formats:

  • .PDF
  • .XML
  • .HTML
  • .TXT
  • .RTF

HTTPS Certifications

Only the following certifications are allowed:

  • PFX
  • PEM

Default Configuration

Values

  • CLICK DEPTH = 20
  • REDUNDANT PATH = 5
  • PAGE LIMIT = 500
  • CLICK DEPTH = 20

States

  • OPEN (issue)
  • NOISE

Results Grouped By

  1. VULNERABILITIES - (Type of test)
  2. WEB PAGES
  3. PARAMETERS

Flash Defaults

  • DEPTH LIMIT = 20
  • CLICK LIMIT = 500
  • SCREEN LIMIT = 200

Notes

To reduce false positives: ?

  • Use a custom error page

To fix communication errors to website: ?

  • Increase timeout allowed
  • Reduce # of threads (tests)

Can see communication errors in: ?

  • Traffic Log
  • System Log
  • Scan Log

Noise - Never a Problem
Non-Vulnerable - Problem but not on your website

Test - Must Know

PAGES WHAT TO KNOW
1-18Grouping of Results
1-19Tab Purposes
2-11License Types
3-18Manual vs Automatic Exposure
4-5Scan Types
4-5Incomplete Result Reasons
5-34Re-Scan Types
8-12JavaScript Types
8-16Flash Vulnerabilities
8-17Where Unsupported Flash Movies Can Be Seen
9-5Metric Groups For Vulnerability Scoring
9-8Differences Between Exceptions and Exclusions
13-5Vulnerabilities of Web Services
15-18Reasons For Communication Errors

Definitions

  • Federation - Central ID Management
  • IAM - ID Access Management
  • UTM - Unified Threat Management
  • DLP - Data Loss Prevention
  • MSS - Managed Security Services
  • ISS - Internet Security Services
  • XSS - Cross-Site Script (Phishing Attack)
  • HASM - Hosted Application Security Management
  • VMS - Vulnerability Management Services
  • IDS - Intrusion Detection System
  • IPS - Intrusion Prevention System
  • SSO - Single Sign-On
  • CWE - Common Weakness Evaluation