menu

Web Application Scanning Solutions

Our robust cloud web application scanning (WAS) solution for continuous web app discovery and detection of vulnerabilities and misconfigurations, finds and catalogs all web apps in your network, including new and unknown ones, and scales from a handful of apps to thousands. With WAS, admins can tag applications with labels and then use those labels to control reporting and limit access to scan data.

WAS’ deep scanning covers all apps on network perimeter, in internal environment and under active development, and even APIs that support mobile devices. It also covers public cloud instances, and gives instant visibility of vulnerabilities like SQLi and XSS.

The solutions can insert security into application development and deployment in DevSecOps environments making possible to detect code security issues early and often, test for quality assurance and generate comprehensive reports.

Our WAS solution scans an organization’s websites, and identifies and reports infections, including zero-day threats via behavioral analysis. Detailed malware infection reports accompany infected code for remediation. A central dashboard displays scan activity, infected pages and malware infection trends, and lets users initiate actions directly from its interface. Malware detection functionality is provided via an optional add-on.

  • The most common application security weakness is the failure to properly validate input coming from a user or the environment the application runs in before using it. Common attacks associated with input validation vulnerabilities include:
  •   Buffer overflow
  •  Cross-site scripting
  •  Code injection
  •  SQL injection
  •  OS commanding
  •  Canonicalization
  • Vulnerabilities in this category include failure to properly check the authentication of theuser or bypassing the authentication system altogether. Common attacks associated with authentication vulnerabilities are as follows:
  •  Login bypassing
  •  Fixed parameter manipulation
  •  Brute force and dictionary attacks
  •  Cookie replay
  •  Pass-the-hash attacks
  • Vulnerabilities in this category are related to the creation, tracking, and disposal of the session identifiers. By mismanaging the session handling, an attacker can guess or reuse a session key/ID and take over the session and the identity of a legitimate user. Common attacks associated with session management vulnerabilities include:
  •  Session hijacking
  •  Session replay
  •  Man-in-the-middle attacks
  • Parameter manipulation vulnerabilities allow the manipulation of parameters exchanged between a client and the server in order to modify application data, such as user credentials and permissions, price and quantity of products, and others. This information can be stored in cookies, in hidden form fields, or in URL query strings. Common attacks associated with parameter manipulation vulnerabilities are as follows:
  •  Query string manipulation
  •  Form field manipulation
  •  Cookie manipulation
  •  HTTP header manipulation