Types of vulnerabilities that awvs tool can detect
AWVS is capable of detecting various types of vulnerabilities.
AcunetixWebVulnerabilityScanner (AWVS for short) is a well-known web vulnerability scanning tool that tests the security of target websites and detects prevalent security vulnerabilities through web crawlers.
AWVS is able to automatically scan for vulnerabilities in web applications. During the scanning process, AWVS is able to detect various types of vulnerabilities, including SQL injection, cross-site scripting attacks, file inclusion vulnerabilities, etc. AWVS also provides a vulnerability tracking feature, which can help users to manage vulnerabilities, track the progress of vulnerability fixes, and improve vulnerability fixing efficiency and quality. In this article, we will introduce AWVS vulnerability tracking features in detail, including vulnerability management, vulnerability tracking and vulnerability repair.
Introduction of AWVS Vulnerability Tracking Functions
1. Vulnerability Status Tracking
AWVS provides a variety of vulnerability statuses, including unacknowledged, acknowledged, repaired, and ignored. Users can track the progress of vulnerability remediation based on the vulnerability status. For example, users can mark an acknowledged vulnerability as repaired status in order to track the progress of vulnerability repair.
2. Vulnerability Handling Records
AWVS provides a vulnerability handling record function, which can record all kinds of operation records in the process of vulnerability fixing, such as fixing personnel, fixing time, fixing method and other information. Users can track the progress of vulnerability remediation based on the vulnerability handling records. For example, users can sort vulnerabilities by repair time to track vulnerability repair progress.
What is Vulnerability Scanning
Vulnerability scanning refers to a security detection (penetration attack) behavior based on a vulnerability database, through scanning and other means of detecting the security vulnerabilities of a specified remote or local computer system and discovering exploitable vulnerabilities.
Vulnerability scanners include different kinds of network leakage scanning, host leakage scanning, database leakage scanning and so on.
The quality assessment of access to newly opened websites and new columns, as well as the checking and prevention of the daily operation of website systems and risk control have become the key elements of annual security inspections in various industries. As a specific implementation of the regular inspection work of the security personnel, there is an urgent need to choose an excellent website scanning products for efficient and thorough Web vulnerability assessment checks, and how to choose a truly practical product has become a more tangled problem.
The advantages and disadvantages of common Web scanning solutions
Currently, there are many common products that support Web scanning solutions, and we are more familiar with the integrated Web scanning module of the all-in-one system scanner, the open source scanner software that can be downloaded free of charge from the Internet, as well as the independent Web scanner products that have just come to the forefront in recent years. scanning and vulnerability discovery.
An all-in-one system scanner usually combines host scanning, configuration verification, Web scanning, and weak password scanning, making it a powerful and comprehensive multifunctional product. However, the high degree of encapsulation of all-in-one results in the scanning of security, in addition to not being able to allocate all the computing resources in the Web scanning, the scanning engine itself has to take into account the full range of trade-offs and tuning. On the contrary, the target Web applications present a variety of types, large-scale and operational specificity, in the face of tens of thousands, 100,000 or even millions of web pages of the number of sites, this all-in-one product is poor performance, the use of a kind of ox pulling the train feeling; at the same time, the efficient implementation of the scanning assessment must have a highly concurrent web page link crawler to identify the web plug-ins and Web plug-ins interact with the logic of judgment, this The reality of the conflict leads to the all-in-one scanner in the Web scanning and performance experience is mediocre, the advantages are not prominent.
Online open source Web scanner software, although completely free and can find some basic vulnerability information, but the first time in the discovery of new Web vulnerabilities and vulnerability trend tracking analysis, repair, does not have the ability to support the later. In addition, there are too many inherent shortcomings in the humanized design and low learning threshold, and its performance and stability are far from commercial software.
In the face of the synthesis of similar products, confused by the Web scanning scenarios demand a variety of limitations, we are very pleased to see the recent years the rise of the reputation of the Web scanner products. As an automated assessment tool, it conducts in-depth URL discovery and comprehensive scanning of Web applications based on formulated policies, looking for real Web application security vulnerabilities, such as cross-site scripting, SQL injection, command execution, directory traversal, and insecure server configurations.The Web Scanner product can help us to correctly understand the detailed distribution, number, and nature of Web application vulnerabilities by proactively generating statistical analysis reports. The Web Scanner product can help us understand the detailed distribution, number and risk priority of Web application vulnerabilities by actively generating statistical analysis reports, and provide strong improvement suggestions for subsequent patching of the discovered security vulnerabilities, which is a solid tool to help us efficiently and thoroughly carry out Web vulnerability assessment and checking.
Three myths about Web scanners
There are many brands of Web scanners on the market, and they are often too one-sided and extreme in their evaluations, mainly because of three myths.
Myth 1: More is better!
The vulnerability library entries, check out the vulnerability is good. web scanner to face a huge number of different applications, in order to enhance the detection performance, more than the use of high-efficiency web general plug-ins to a sweep of more than one, which is no longer limited to a specialized application system, the deeper aggregation of the merger, as much as possible, found that a variety of applications of the same kind of vulnerability. At the same time, for the scanned non-false alarm vulnerabilities, if the same page belongs to a different parameter due to the same vulnerability, generalization and organization, so that the final presentation of the vulnerability report is simple but not simple, to avoid the number of redundancy, clutter. Therefore, if there is no plug-in ability to merge, relying only on a large number of specialized Web system plug-ins, listing the number of various types of vulnerability list to win praise of the Web scanner, the nature of the existence of too much unprofessionalism.
Myth 2: Fast is good!
The idea that a fast scanner takes less time is a good one. As websites become more complex, we expect Web scanners to be more efficient in completing scanning tasks during daily inspections, which is fine, but the essence of the inspection is to maximize the number of vulnerabilities found in advance, and to formulate the subsequent corresponding patch plan at the first time. Therefore, in the face of the same target site, Web scanners can detect the effective presence of more vulnerabilities per unit of time, this fast is really good.
Myth 3: Small is good!
The idea that scanning has little impact on the target business is good! This sentence itself is not a problem, as long as the Web scanner in the implementation of the scanning process, the target system load response and network link bandwidth consumption, the impact is small enough, that is, we often say “lossless scanning”, it has a good Web scanner should be the prerequisites. However, this must be in the premise of maximizing the discovery of Web vulnerabilities in order to consider the key factors, away from the essence of this product, the cart before the horse.
Five basic evaluation criteria
So, where do we start in evaluating a Web scanner? What are the specific judgment criteria?
All – to identify a wide variety of Web applications, integration of the most comprehensive Web general plug-ins, through a comprehensive identification of the site structure and content, to determine the possibility of each vulnerability, in other words, vulnerability scanning detection rate must be high, the rate of leakage must be low, and ultimately to output a comprehensive and detailed scanning report. This requires its Web application identification, support for various types of Web language types (php, asp, .net, html), application system types (portals, e-government, forums, blogs, online banking), application types (IIS, Apache, Tomcat), third-party component types (Struts2, WebLogic, WordPress) and so on, WordPress), etc.; plug-in integration, support for international standard vulnerability classification OWASPTOP10 and WASC plug-in classification templates, allowing custom scanning plug-in templates, the first plug-in update speed, etc..
Accurate – higher vulnerability accuracy is a symbol of the authority of the Web scanner, visual analysis can help users accurately locate vulnerabilities, vulnerability analysis. False alarms are a topic that cannot be avoided in scanning products.Web scanners interact logically with any URL page of the target site through a generic plug-in, and through visual vulnerability tracking technology, accurately determine and locate vulnerabilities, and provide detailed rectification and analysis reports that are easy to read and understand. In addition, a good Web scanner is also more user-friendly, allowing the scanner to perform manual and automated batch verification of vulnerabilities after a vulnerability is found, thus doubly guaranteeing higher accuracy results.
Fast – fast scanning speed, in order to be able to face the increasing size of the site, more and more frequent site checking with ease, progress guarantee. A fast Web scanner in addition to a powerful scanning engine, up to a million / day scanning speed, but also has the flexibility of the cluster scanning ability to add any scanning node, easy to cope with may be demanding scanning cycle time requirements.
Stable — stable and reliable operation process, on the target environment, near-zero impact of the Web scanner, in order to put into use in a large area of the industry, especially some of the business impact of the requirements of the industry will be more favored, after all, no one can accept an assessment of the class of products, the target will cause additional damage. There are now a number of Web scanner products on the market, which through the cycle of probing the target system, network links, their own performance load and other mechanisms, based on the dynamic changes in the load of the target environment and automatically adjust the scanning parameters, thus ensuring that the scanning process is stable enough and almost zero impact. In addition, as the scale of the website and the scope of the inspection continue to expand, it is necessary to ensure continuous and stable scanning execution and statistical evaluation, and to avoid halfway scanning progress as much as possible, which also puts forward a high reliability operation requirement.
Easy – user-friendly interface configuration, low-cost report learning and strong guidance on patching recommendations. Especially vulnerability distribution details and scenarios reproduced, most of the Web scanner reports on the market require a secondary interpretation of professional security personnel, the ordinary security operations and maintenance inspectors can read and understand, only to know up to a hundred pages of reports give important advice and the next step in the specific repair measures, which undoubtedly caused a high technical threshold for users, then how to solve this easy to read, easy to use the problem has become an important part of the rating of the An important indicator of its strengths and weaknesses.
In short, an excellent Web scanner product, it needs to strictly adhere to the five core guidelines, full, accurate, fast, stable, easy to do a full range of balanced, so as to achieve the basic excellence. At the same time, with the increasingly diversified demands of the website inspection, if it can be accompanied by some differentiated features to meet the different scenarios of the website security operation and maintenance scanning requirements, such as the website’s basic information collection, vulnerability tracking of the whole process timeline, step-by-step visualization of the vulnerability validation and scenarios reproduced, automatic repair through train, etc., will greatly increase the scanner’s evaluation of the strength of the excellent.
What are the tools to scan for vulnerabilities?
System vulnerabilities with 360 Security Guard can be, if other vulnerabilities generally hackers know – but people do not say, they sell money Oh –