En el post "Arachni - Web Application Security Scanner Framework", presentamos esta herramienta, en la actualidad la misma se encuentra en la version 2.2.1.
ChangeLog
- Web UI v0.1-pre (Utilizing the Client - Dispatch-server XMLRPC architecture) (New) - Changed classification from "Vulnerabilities" to "Issues" (New) - Improved detection of custom 404 pages. - Reports updated to show plug-in results. - Updated framework-wide cookie handling. - Added parameter flipping functionality ( cheers to Nilesh Bhosale) - Major performance optimizations (4x faster in most tests) - All modules now use asynchronous requests and are optimized for highest traffic efficiency - All index Arrays have been replaced by Sets to minimize look-up times - Mark-up parsing has been reduced dramatically - File I/O blocking in modules has been eliminated - Crawler - Improved performance - Added '--spider-first" option (New) - Substituted the XMLRPC server with an XMLRPC dispatch server (New) - Multiple clients - Parallel scans - Extensive logging - SSL cert based client authentication - Added modules (New) - Audit - XSS in event attributes of HTML elements - XSS in HTML tags - XSS in HTML 'script' tags - Blind SQL injection using timing attacks - Blind code injection using timing attacks (PHP, Ruby, Python, JSP, ASP.NET) - Blind OS command injection using timing attacks (*nix, Windows) - Recon - Added plugins (New) - Dictionary attacker for HTTP Auth - Dictionary attacker for form based authentication - Cookie collector -- Listens to all traffic and logs changes in cookies - Healthmap -- Generates sitemap showing the health of each crawled/audited URL - Content-types -- Logs content-types of server responses aiding in the identification of interesting (possibly leaked) files - WAF (Web Application Firewall) Detector - MetaModules -- Loads and runs high-level meta-analysis modules pre/mid/post-scan - AutoThrottle -- Dynamically adjusts HTTP throughput during the scan for maximum bandwidth utilization - TimeoutNotice -- Provides a notice for issues uncovered by timing attacks when the affected audited pages returned unusually high response times to begin with. It also points out the danger of DoS attacks against pages that perform heavy-duty processing. - Uniformity -- Reports inputs that are uniformly vulnerable across a number of pages hinting to the lack of a central point of input sanitization. - New behavior on Ctrl+C - The system continues to run in the background instead of pausing - The user is presented with an auto-refreshing report and progress stats - Updated module API - Timing/delay attacks have been abstracted and simplified via helper methods - The modules are given access to vector skipping decisions - Simplified issue logging - Added the option of substring matching instead of regexp matching in order to improve performance. - Substituted regular expression matching with substring matching wherever possible. - Reports: - Added plug-in formatter components allowing plug-ins to have a say in how their results are presented (New) - New HTML report (Cheers to Christos Chiotis for designing the new HTML report template.) (New) - Updated reports to include Plug-in results: - XML report - Stdout report - Text report
No hay comentarios:
Publicar un comentario