ScannerVersionVendor
Grendel Scan1.0David Byrne

Tested Against WAVSEP Version:
1.0

The SQL Injection Detection Accuracy of the Scanner:
Detection AccuracyChart
42.65% Detection Rate
50.00% False Positives
(58/136)
(5/10)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)15 out of 20Cases Detected: 1(1st&2nd)-14 Cases Missed: 15-19 (detected as errors)
Errorneous 500 ResponsesHTTP POST (Body Parameters)14 out of 20Cases Detected: 1(1st&2nd)-5,7-14 Cases Missed: 6,15-19 (detected as errors)
Errorneous 200 ResponsesHTTP GET (Query String Parameters)15 out of 20Cases Detected: 1(1st&2nd)-14 Cases Missed: 15-19 (detected as errors)
Errorneous 200 ResponsesHTTP POST (Body Parameters)14 out of 20Cases Detected: 1(1st&2nd)-5,7-14 Cases Missed: 6,15-19 (detected as errors)
Valid 200 ResponsesHTTP GET (Query String Parameters)0 out of 20Cases Missed: 1-19
Valid 200 ResponsesHTTP POST (Body Parameters)0 out of 20Cases Missed: 1-19
Identical 200 ResponsesHTTP GET (Query String Parameters)0 out of 8Cases Missed: 1-8
Identical 200 ResponsesHTTP POST (Body Parameters)0 out of 8Cases Missed: 1-8
False Positive SQLi Test CasesHTTP GET (Query String Parameters)5 out of 102,4,6,7,8

The Reflected XSS Detection Accuracy of the Scanner:
Detection AccuracyChart
12.12% Detection Rate
0.00% False Positives
(8/66)
(0/7)
Response TypeInput VectorDetection RateDetails
Reflected XSSHTTP GET (Query String Parameters)8 out of 33Cases Detected: 1-5,30(1st&2nd),32 Cases Missed: 6-29,31
Reflected XSSHTTP POST (Body Parameters)0 out of 33Cases Missed: 1-32
False Positive RXSS Test CasesHTTP GET (Query String Parameters)0 out of 7None

WAVSEP Scan Log:
The test was executed with the following configuration:
In the test module selection I enabled both the GET and POST checkboxes in the Spider Form Baseline configuration, checked almost all the other features (except the spider URL regex and the search engine recon), and went over and configured each one (GET and POST enabled).
I enabled all the Information disclosure Plugins, CRLF Injection, Directory Traversal, Generic Fuzzing and all XSS & SQLI plugins. I set the XSS testing aggression to High in the ?XSS - query? and the ?ErrorXSS? plugins, I enabled ?SQL Tautologies? optional plugin.
I defined burp-proxy as an outgoing proxy to make sure that the tool is working properly.
The following URLs were scanned:
http://localhost:8080/wavsep/index-xss.jsp
http://localhost:8080/wavsep/index-sql.jsp
http://localhost:8080/wavsep/index-false.jsp
The tool successfully crawled all URLS, and even submitted values in POST parameters (something that came as a surprise to me since previous checks I performed showed that POST parameters were ignored by this tool).
The initial scan discovered SQL injection vulnerabilities, but did not locate any XSS vulnerabilities, so I performed another scan in which the fuzzing and SQL injection plugins were disabled; that still didn?t solve the problem, so I disabled all plugins except the XSS and spider plugins (and defined the XSS plugins with Medium aggression levels), and finally obtained the relevant missing results.

The WIVET Score of the Scanner:
Detection AccuracyChart
14.0% Detection Rate

WIVET Scan Log:
I defined both index.php and menu.php as the initial entry points, enabled the URL-Gegex, Form-baseline and HTML tag requester spider plugins (and enabled every sub-feature that they had), and in addition, enabled the directory listing, robots.txt and XSS plugins.
I initialized WIVET's session, defined fiddler as an upstream proxy and used it's filter features to define a valid session identifier. Since I already removed the logout page (100.php) from the menu page, I did not need to exclude any URLs.

Copyright © 2010-2016 by Shay Chen. All rights reserved.
Click here to learn how this information may be published or reused.