Skipfish is a powerful and easy-to-use scanning tool developed by Google. # Install the required software library: sudoapt-getinstalllibssl0.9.8sudoapt-getinstalllibssl-devsudoapt-getinstallopenssl install skipfish: wgethttp: // skipfish.googlecode.com/files/skipfish-1.69b.
Skipfish is a powerful and easy-to-use scann
Skipfish is a free, open-source, and Web application.ProgramSecurity detection tools. Skipfish features:
-Fast: skipfish is fully written by C. It features highly optimized HTTP processing capabilities and the lowest CPU usage. It can easily process 2000 requests per second;
-Easy to use: Uses heuristic scanning technology to host multiple web architec
1. Introduction
Skipfish is an automated web security scanner released by Google to reduce users ' online security threats. The project address is in http://code.google.com/p/skipfish/.
2, installation
1) Installation of the required software library:sudoapt-getinstalllibssl0.9.8Sudoapt-getinstalllibssl-devSudoapt-getinstallopenssl2) Installation Skipfish:wget http://skipfish.googlecode.com/files/
Edition is a free version of Netsparker Community and provides basic vulnerability detection functions. User-friendly and flexible.
Websecurify
Websecurify is an open-source cross-platform website security check tool that helps you precisely detect Web application security issues.
Wapiti
Wapiti is a Web application vulnerability check tool. It has a "dark box operation" scan, that is, it does not care about the source code of the Web application, but it will scan the deployment of Web pages
Cadaver
This tool is a UNIX command-line program for browsing and modifying WebDAV shares. This tool is a client-side, command-line format for linking WebDAV Davtest
Test uploading files to servers that support WebDAV
Syntax: Davtest-url http://222.28.136.226/dav/ Deblaze
Enumerations for flash remote calls, which are typically used in XSS or deeper web security, may be fimap
file contains vulnerability utility grabber
Grabber is a Web application vulnerability scanner that allows you to specif
ubiquitous, making it easy for hackers to use it for denial-of-service attacks. Therefore, when using a Secure Sockets Layer, you must complete basic validation and use tools such as Google skipfish for penetration testing. Insecure applications not only threaten their own stability, but may also adversely affect the company's reputation due to data integrity issues, such as the presence of customer "A" to browse Customer "B" data.There is no cross-b
authorization issues
6. Environment andCodeSecurity (server configuration, obfuscation, shelling, etc)
The cause is often:
1. architecture design defects or inadequate security considerations
2. Code bug
3. Incomplete tests, insufficient code coverage (of course, high code test coverage means a high cost, generally refers to testing logic and data)
4. Did not promptly remove the testing code and release the debug information to the production environment
5. server settings, espe
1.Netsparker Community Edition (Windows)This program can detect SQL injection and cross-page scripting events. It will provide you with some solutions when the test is complete.2.Websecurify (Windows, Linux, Mac OS X)This is an easy-to-use open source tool, and there are some people plug-in support that can automatically detect Web page vulnerabilities . Test reports can be generated in multiple formats after running.3.Wapiti (Windows, Linux, Mac OS X)This is an open source tool written in Pytho
of connections per unit of time:
Protection for Windows Server
(1), install [Symantec Terminal Protection 12. Small Business Edition]. Endpoint_12, the virus and port scanning and other protection;
(2), open firewall, IPSec.
F. Security audits
Frequency of Audit object tools
Linux system nmap 1 months
Nessus 3 months
Password file John the Ripper 3 months
Web Business Nikto 1 months
AppScan 1 months
Zed Attack Proxy 1 months
Tool ScanningCurrently, web security scanners are mature in detecting XSS, SQL injection, OPEN redirect, and PHP File Include vulnerabilities.Commercial Software web security scanner: Includes IBM Rational Appscan, WebInspect, Acunetix WVSFree scanners: W3af, Skipfish, etc.Based on the business funds, you can consider purchasing commercial scanning software, or use free software, each with its own advantages.The home page can scan the website on a lar
, token disclosure may occur. Under XSS attacks, read the token value and then construct a legitimate request, which can be called: XSRF.iv. Safety of HTML5HTML5 added some new tags and attributes, so that the XSS attack has changed, if the original XSS filter is used "blacklist", will lead to attackers with HTML5 new tags to attack, if the use of "white list", this will be less hidden.Five, the common front-end framework to prevent XSS attacksReact all strings are escaped by default. AngularJS
1.Netsparker Community Edition (Windows)This program can detect SQL injection and cross-page scripting events. It will provide you with some solutions when the test is complete.2.Websecurify (Windows, Linux, Mac OS X)This is an easy-to-use open source tool, and there are some people plug-in support that can automatically detect Web page vulnerabilities. Test reports can be generated in multiple formats after running3.Wapiti (Windows, Linux, Mac OS X)This is an open source tool written in Python
application. An appropriate service interrupt test is required. This is important because today's applications are distributed and service-oriented, requiring a large number of network services. Unlimited requests for unavailable services can damage the application. The load balancer also needs to be tested to ensure that it works properly and that each node is balanced.
#4, not complying with the minimum security requirements. as mentioned above, Web services can be seen everywhere, making it
, which means a vulnerability scanner that adapts to an average score.After averaging the ratio of the accuracy of the inspection, we get a copy of the following results (the first 14-bit scanners):Rank Vulnerability Scanner Vendor Detection rate Input Vector Coverage Average Score1 Arachni tasos Laskos 100% 100% 100%2 Sqlmap sqlmap developers 97.06% 100% 98,53%3 IBM AppScan IBM Security Sys Division 93.38% 100% 96,69% 4 Acunetix WVS Acunetix 89.71% 100% 94,85% 5 ntospider NT Objectives 85.29%
63.24%
100%
81,62%
10
Skipfish
Michal Zalewski–google
50.74%
100%
75,37%
11
Wapiti
OWASP
100%
50%
75%
12
Netsparker
Mavituna Security
98%
50%
74%
13
Paros Pro
Milescan Technologies
93.38%
50%
71,69%
14
ZAP
OWASP
77,21%
50%
63,60%
We ca
Contact Us
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.