SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
SYHUNT
Web Application Security Assessment Provider
Sandcat Assessment Suite
What is Sandcat?


P Sandcat is a hybrid multilanguage web
  application security assessment suite
P A software suite that simulates web-based attacks
P Proactively guards an organization's Web
  infrastructure against web application security
  threats
 < Finds the vulnerabilities before the hackers
Sandcat Assessment Suite
Evolution


P Initially an evasion-capable web server scanner
 < With CGI/directory brute force scanning and a very
   extensive database of checks. (2001-2003)
P Added spidering & injection capabilities.
 < Became a remote web app sec scanner (2004)
P Added source code scanning capabilities (2008)
Sandcat Assessment Suite
How It Works


P Scans live websites for multiple classes of
  vulnerabilities - an external pen-test
 < This is the hacker’s perspective (aka blackbox)
P Scans locally, its source for the same multiple
  classes of vulnerabilities - an internal code review
  (aka whitebox)
P When it combines both approaches, you have
  what is called a hybrid analysis (or greybox)
Sandcat Assessment Suite
Sandcat’s hybrid multilanguage web application security
scanning capabilities




                        External                        Internal
                      Remote Scanner                 Source Scanner


        HTML5-          JavaScript        Scans
       Aware Spider     Emulation      Any Web App
Features
Core Functionality


P Concurrency/Scan Queue Support (Multithreads)
P Deep Crawling (Spidering)
 < Maps the entire web site structure (all links, forms,
   XHR requests and other entry points)
P Multiple Versions (Windows Only)
 < GUI (Graphical User Interface)
 < CLI (Command-Line Interface)
 < Web-Interface (Apache-Based)
Sandcat Assessment Suite
Core Functionality


P Report Generation
 < Multiple formats and templates
 < Compliance - OWASP Top 10, PHP Top 5,
   CWE/SANS Top 25, Payment Card Industry (PCI),
   etc. Also includes:
 < OSVDB references
 < CVE & CWE references
 < Charts
Vulnerability Coverage
Sandcat Database


P Over 460 remote web application security checks
  in over 24 categories of web attacks
 < XSS, SQL Injection, File Inclusion, Command
   Execution, etc
P OWASP's Top Ten Most Critical Web
  Application Security Vulnerabilities & PHP Top
  5 Vulnerabilities
Vulnerability Coverage
Sandcat Database


P Over 561 source checks, covering several types
  of web attacks:
 < SQL Injection
   – Both remote and source checks tailored to cover MySQL,
     Oracle, PostgreSQL, Microsoft Access, Microsoft SQL
     Server, SQLite, Firebird, Sybase...
 < Cross-Site Scripting (XSS), Arbitrary File
   Manipulation, Command Execution, File Inclusion
   (Local & Remote) and more.
Vulnerability Coverage
Sandcat Database


P 29K (29 thousand) web vulnerabilities researched
  since 2003 affecting specific web
  applications/servers.
P Examples:
 < StatPressCN Plugin for Wordpress wp-
   admin/admin.php Multiple Parameter XSS (CVE-
   2011-0641)
 < PHPCMS 2008 data.php where_time Parameter SQL
   Injection (CVE-2011-0645)
Additional Components
Other Sandcat Components


P Sandcat Log Analyzer
 < Scans HTTP logs (created by web servers) for
   intrusion attempts
P Sandcat Apache/PHP Hardener
 < Scans Apache and PHP configuration files for weak
   security settings
WAVSEP 2011 Comparison
WAVSEP Comparison


P Independent web application scanner accuracy
  tests produced every year by Shay Chen (OWASP
  Israel), an application security consultant
P The most comprehensive ever made (a total of 60
  tools were included this year, including the
  leading commercial tools)
P What did we find out?
WAVSEP 2011 Comparison
Sandcat Accuracy Tests (August 2011)


P We’ve the best XSS vulnerability detection rate
  in the market
 < #1 when the Free Edition of Sandcat is compared with
   other free and open source tools
 < #2 when Sandcat Pro is compared to other commercial
   tools such as IBM AppScan, HP WebInspect and
   others
   – Sandcat Pro, AppScan and ParosPro top the WAVSEP
     benchmark charts with 100 percent or near-100 percent XSS
     detection rates
WAVSEP 2011 Comparison
Sandcat Accuracy Tests (August 2011)


P SQL Injection (SQLi)
 < Sandcat also scored a 100 percent error-based SQL
   Injection detection rate
   – Sandcat excelled at identifying an additional large set of 80
     error-based SQL Injection vulnerabilities (detected 100% of
     the vulnerabilities, both GET-based and POST-based)
   – Sandcat’s SQL Injection checks covers several types of
     databases
WAVSEP 2011 Comparison
Sandcat Accuracy Tests (August 2011)


P Sandcat scored a 100 percent detection rate
  running at half its capabilities
 < Sandcat’s white-box (source code) scanning
   capabilities were not covered in the tests.
Additional Highlights
Standards & Additional Info


P Sandcat makes the list of CVE-compatible
  products and services provided by the Mitre
  Corporation who created the standard.
P Invited this year by the U.S. NIST (National
  Institute of Standards and Technology) to
  participate the Static Analysis Tool Exposition
  (SATE)
 < SATE’s goal: advance research in the field of static
   analysis tools
Additional Highlights
Standards & Additional Info


P Used by the U.S. Department of Defense
P Listed and covered in the Information Assurance
  Tools Report published this year (2011) by the
  U.S. Department of Defense’s IATAC
  (Information Assurance Technology Analysis
  Center), alongside leading tools
Customers
Where they come from


P From over 26 countries. Mainly from the United
  States, United Kingdom and Canada
P From different markets and industries
 < Consulting, Education/Government, Finance, Banking,
   and Insurance, High Technology & Software,
   Hospitality, Travel & Tourism, Telecommunications,
   etc
Customers
Where they come from (Government & Military)


P NASA, US NOAA, US DoE (Department of
  Energy) and others
P US Navy, UK’s Royal Air Force
P Intelligence Agencies
 < CSE (Canada’s intelligence agency)
 < CISEN (Mexico’s intelligence agency)
The End
Thank You


More Info: www.syhunt.com
Twitter: @syhunt
Email: contact@syhunt.com

Contenu connexe

Similaire à Syhunt Presentation 2011

Continuous Security Testing
Continuous Security TestingContinuous Security Testing
Continuous Security TestingRay Lai
 
Zibrasoft | Software QA Testing Company Inida
Zibrasoft | Software QA Testing Company InidaZibrasoft | Software QA Testing Company Inida
Zibrasoft | Software QA Testing Company InidaZibraSoft Technologies
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chanceDr. Anish Cheriyan (PhD)
 
Netserv Software Testing
Netserv Software TestingNetserv Software Testing
Netserv Software Testingsthicks14
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxjohnpragasam1
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxazida3
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxcgt38842
 
Monitoring Application Attack Surface and Integrating Security into DevOps Pi...
Monitoring Application Attack Surface and Integrating Security into DevOps Pi...Monitoring Application Attack Surface and Integrating Security into DevOps Pi...
Monitoring Application Attack Surface and Integrating Security into DevOps Pi...Denim Group
 
OWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptxOWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptxnmk42194
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Jeff Williams
 
Cost Effective Web Application Testing
Cost Effective Web Application TestingCost Effective Web Application Testing
Cost Effective Web Application TestingHari Pudipeddi
 
Cost effective web application testing
Cost effective web application testingCost effective web application testing
Cost effective web application testingHarinath Pudipeddi
 
Cost effective web application testing
Cost effective web application testingCost effective web application testing
Cost effective web application testingHarinath Pudipeddi
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...OWASP
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointIvanti
 
Dependency-Check Ecosystem - OWASP Summit 2017
Dependency-Check Ecosystem - OWASP Summit 2017Dependency-Check Ecosystem - OWASP Summit 2017
Dependency-Check Ecosystem - OWASP Summit 2017Steve Springett
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guideSudhanshu Chauhan
 
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...Agile Testing Alliance
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP Technology
 

Similaire à Syhunt Presentation 2011 (20)

OWASP an Introduction
OWASP an Introduction OWASP an Introduction
OWASP an Introduction
 
Continuous Security Testing
Continuous Security TestingContinuous Security Testing
Continuous Security Testing
 
Zibrasoft | Software QA Testing Company Inida
Zibrasoft | Software QA Testing Company InidaZibrasoft | Software QA Testing Company Inida
Zibrasoft | Software QA Testing Company Inida
 
Penetration testing dont just leave it to chance
Penetration testing dont just leave it to chancePenetration testing dont just leave it to chance
Penetration testing dont just leave it to chance
 
Netserv Software Testing
Netserv Software TestingNetserv Software Testing
Netserv Software Testing
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
OWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptxOWASP_Top_Ten_Proactive_Controls_v2.pptx
OWASP_Top_Ten_Proactive_Controls_v2.pptx
 
Monitoring Application Attack Surface and Integrating Security into DevOps Pi...
Monitoring Application Attack Surface and Integrating Security into DevOps Pi...Monitoring Application Attack Surface and Integrating Security into DevOps Pi...
Monitoring Application Attack Surface and Integrating Security into DevOps Pi...
 
OWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptxOWASP_Top_Ten_Proactive_Controls_v32.pptx
OWASP_Top_Ten_Proactive_Controls_v32.pptx
 
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...Continuous Application Security at Scale with IAST and RASP -- Transforming D...
Continuous Application Security at Scale with IAST and RASP -- Transforming D...
 
Cost Effective Web Application Testing
Cost Effective Web Application TestingCost Effective Web Application Testing
Cost Effective Web Application Testing
 
Cost effective web application testing
Cost effective web application testingCost effective web application testing
Cost effective web application testing
 
Cost effective web application testing
Cost effective web application testingCost effective web application testing
Cost effective web application testing
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
Dependency-Check Ecosystem - OWASP Summit 2017
Dependency-Check Ecosystem - OWASP Summit 2017Dependency-Check Ecosystem - OWASP Summit 2017
Dependency-Check Ecosystem - OWASP Summit 2017
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
 
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis OverviewSAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
 

Dernier

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Dernier (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Syhunt Presentation 2011

  • 1. SYHUNT Web Application Security Assessment Provider
  • 2. Sandcat Assessment Suite What is Sandcat? P Sandcat is a hybrid multilanguage web application security assessment suite P A software suite that simulates web-based attacks P Proactively guards an organization's Web infrastructure against web application security threats < Finds the vulnerabilities before the hackers
  • 3. Sandcat Assessment Suite Evolution P Initially an evasion-capable web server scanner < With CGI/directory brute force scanning and a very extensive database of checks. (2001-2003) P Added spidering & injection capabilities. < Became a remote web app sec scanner (2004) P Added source code scanning capabilities (2008)
  • 4. Sandcat Assessment Suite How It Works P Scans live websites for multiple classes of vulnerabilities - an external pen-test < This is the hacker’s perspective (aka blackbox) P Scans locally, its source for the same multiple classes of vulnerabilities - an internal code review (aka whitebox) P When it combines both approaches, you have what is called a hybrid analysis (or greybox)
  • 5. Sandcat Assessment Suite Sandcat’s hybrid multilanguage web application security scanning capabilities External Internal Remote Scanner Source Scanner HTML5- JavaScript Scans Aware Spider Emulation Any Web App
  • 6. Features Core Functionality P Concurrency/Scan Queue Support (Multithreads) P Deep Crawling (Spidering) < Maps the entire web site structure (all links, forms, XHR requests and other entry points) P Multiple Versions (Windows Only) < GUI (Graphical User Interface) < CLI (Command-Line Interface) < Web-Interface (Apache-Based)
  • 7. Sandcat Assessment Suite Core Functionality P Report Generation < Multiple formats and templates < Compliance - OWASP Top 10, PHP Top 5, CWE/SANS Top 25, Payment Card Industry (PCI), etc. Also includes: < OSVDB references < CVE & CWE references < Charts
  • 8.
  • 9. Vulnerability Coverage Sandcat Database P Over 460 remote web application security checks in over 24 categories of web attacks < XSS, SQL Injection, File Inclusion, Command Execution, etc P OWASP's Top Ten Most Critical Web Application Security Vulnerabilities & PHP Top 5 Vulnerabilities
  • 10. Vulnerability Coverage Sandcat Database P Over 561 source checks, covering several types of web attacks: < SQL Injection – Both remote and source checks tailored to cover MySQL, Oracle, PostgreSQL, Microsoft Access, Microsoft SQL Server, SQLite, Firebird, Sybase... < Cross-Site Scripting (XSS), Arbitrary File Manipulation, Command Execution, File Inclusion (Local & Remote) and more.
  • 11. Vulnerability Coverage Sandcat Database P 29K (29 thousand) web vulnerabilities researched since 2003 affecting specific web applications/servers. P Examples: < StatPressCN Plugin for Wordpress wp- admin/admin.php Multiple Parameter XSS (CVE- 2011-0641) < PHPCMS 2008 data.php where_time Parameter SQL Injection (CVE-2011-0645)
  • 12. Additional Components Other Sandcat Components P Sandcat Log Analyzer < Scans HTTP logs (created by web servers) for intrusion attempts P Sandcat Apache/PHP Hardener < Scans Apache and PHP configuration files for weak security settings
  • 13. WAVSEP 2011 Comparison WAVSEP Comparison P Independent web application scanner accuracy tests produced every year by Shay Chen (OWASP Israel), an application security consultant P The most comprehensive ever made (a total of 60 tools were included this year, including the leading commercial tools) P What did we find out?
  • 14. WAVSEP 2011 Comparison Sandcat Accuracy Tests (August 2011) P We’ve the best XSS vulnerability detection rate in the market < #1 when the Free Edition of Sandcat is compared with other free and open source tools < #2 when Sandcat Pro is compared to other commercial tools such as IBM AppScan, HP WebInspect and others – Sandcat Pro, AppScan and ParosPro top the WAVSEP benchmark charts with 100 percent or near-100 percent XSS detection rates
  • 15.
  • 16. WAVSEP 2011 Comparison Sandcat Accuracy Tests (August 2011) P SQL Injection (SQLi) < Sandcat also scored a 100 percent error-based SQL Injection detection rate – Sandcat excelled at identifying an additional large set of 80 error-based SQL Injection vulnerabilities (detected 100% of the vulnerabilities, both GET-based and POST-based) – Sandcat’s SQL Injection checks covers several types of databases
  • 17. WAVSEP 2011 Comparison Sandcat Accuracy Tests (August 2011) P Sandcat scored a 100 percent detection rate running at half its capabilities < Sandcat’s white-box (source code) scanning capabilities were not covered in the tests.
  • 18. Additional Highlights Standards & Additional Info P Sandcat makes the list of CVE-compatible products and services provided by the Mitre Corporation who created the standard. P Invited this year by the U.S. NIST (National Institute of Standards and Technology) to participate the Static Analysis Tool Exposition (SATE) < SATE’s goal: advance research in the field of static analysis tools
  • 19. Additional Highlights Standards & Additional Info P Used by the U.S. Department of Defense P Listed and covered in the Information Assurance Tools Report published this year (2011) by the U.S. Department of Defense’s IATAC (Information Assurance Technology Analysis Center), alongside leading tools
  • 20. Customers Where they come from P From over 26 countries. Mainly from the United States, United Kingdom and Canada P From different markets and industries < Consulting, Education/Government, Finance, Banking, and Insurance, High Technology & Software, Hospitality, Travel & Tourism, Telecommunications, etc
  • 21. Customers Where they come from (Government & Military) P NASA, US NOAA, US DoE (Department of Energy) and others P US Navy, UK’s Royal Air Force P Intelligence Agencies < CSE (Canada’s intelligence agency) < CISEN (Mexico’s intelligence agency)
  • 22. The End Thank You More Info: www.syhunt.com Twitter: @syhunt Email: contact@syhunt.com