LogoScannerVersionVendor
Burp Suite Professional1.7.03PortSwigger

Tested Against WAVSEP Version:
1.6

The SQL Injection Detection Accuracy of the Scanner:
Detection AccuracyChart
100.00% Detection Rate
10.00% False Positives
(136/136)
(1/10)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected: 1(1st&2nd),2-19
Errorneous 500 ResponsesHTTP POST (Body Parameters)20 out of 20Detected: 1(1st&2nd),2-19
Errorneous 200 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected: 1(1st&2nd),2-19 200Error-Experimental-GET:1
Errorneous 200 ResponsesHTTP POST (Body Parameters)20 out of 20Detected: 1(1st&2nd),2-19 200Error-Experimental-POST:1
Valid 200 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected: 1(1st&2nd),2-19 (time based plugin dramatically improves results)
Valid 200 ResponsesHTTP POST (Body Parameters)20 out of 20Detected: 1(1st&2nd),2-19 (time based plugin dramatically improves results)
Identical 200 ResponsesHTTP GET (Query String Parameters)8 out of 8Detected: 1-8 (time based plugin dramatically improves results)
Identical 200 ResponsesHTTP POST (Body Parameters)8 out of 8Detected: 1-8 (time based plugin dramatically improves results)
False Positive SQLi Test CasesHTTP GET (Query String Parameters)1 out of 10Case 6

The Reflected XSS Detection Accuracy of the Scanner:
Detection AccuracyChart
96.97% Detection Rate
0.00% False Positives
(64/66)
(0/7)
Response TypeInput VectorDetection RateDetails
Reflected XSSHTTP GET (Query String Parameters)32 out of 33Detected: 1-30(1st&2nd),32 Missed: 31 RXSS-Experimental-GET: 1,3,5 DOM-XSS-Experimental: 1,2,3,4 (2,4 as DOM Redirect)
Reflected XSSHTTP POST (Body Parameters)32 out of 33Detected: 1-30(1st&2nd),32 Missed: 31 RXSS-Experimental-POST: 1,3,5
False Positive RXSS Test CasesHTTP GET (Query String Parameters)0 out of 7None

The Local File Inclusion Detection Accuracy of the Scanner:
Detection AccuracyChart
69.12% Detection Rate
12.50% False Positives
(564/816)
(1/8)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)53 out of 68Overall: 1-24,25,28,31, 37-44, 46,47,48,49,50, 53-60, 61,62,64,65,66 Path Traversal Detected: 1-24, 37-44, 53-60 Path Manipulation Detected: 25, 28, 31, 46,48,50,62,64,66 47,49,61,65, Previously Detected (int. disabled): 1-24,37-44,53-60
Errorneous 500 ResponsesHTTP POST (Body Parameters)45 out of 68Overall: 1-6,9-12, 15-18, 21,22,24,25,28,31, 37-44, 46,47,48,49,50, 53-60,62,64,65,66 Previously Detected (int. disabled): 1-24,37-44,53-60
Errorneous 200 ResponsesHTTP GET (Query String Parameters)53 out of 68Overall: 1-24,25,28,31, 37-44, 46,47,48,49,50, 53-60, 61,62,64,65,66 Path Traversal Detected: 1-24, 37-44, 53-60 Path Manipulation Detected: 25, 28, 31, 46,48,50,62,64,66 47,49,61,65, Previously Detected (int. disabled): 1-24,37-44,53-60
Errorneous 200 ResponsesHTTP POST (Body Parameters)45 out of 68Overall: 1-6,9-12, 15-18, 21,22,24,25,28,31, 37-44, 46,47,48,49,50, 53-60,62,64,65,66 Previously Detected (int. disabled): 1-24,37-44,53-60
Valid 200 ResponsesHTTP GET (Query String Parameters)53 out of 68Overall: 1-24,25,28,31, 37-44, 46,47,48,49,50, 53-60, 61,62,64,65,66 Path Traversal Detected: 1-24, 37-44, 53-60 Path Manipulation Detected: 25, 28, 31, 46,48,50,62,64,66 47,49,61,65, Previously Detected (int. disabled): 1-24,37-44,53-60
Valid 200 ResponsesHTTP POST (Body Parameters)45 out of 68Overall: 1-6,9-12, 15-18, 21,22,24,25,28,31, 37-44, 46,47,48,49,50, 53-60,62,64,65,66 Previously Detected (int. disabled): 1-24,37-44,53-60
Identical 200 ResponsesHTTP GET (Query String Parameters)53 out of 68Overall: 1-24,25,28,31, 37-44, 46,47,48,49,50, 53-60, 61,62,64,65,66 Path Traversal Detected: 1-24, 37-44, 53-60 Path Manipulation Detected: 25, 28, 31, 46,48,50,62,64,66 47,49,61,65, Previously Detected (int. disabled): 1-24,37-44,53-60
Identical 200 ResponsesHTTP POST (Body Parameters)45 out of 68Overall: 1-6,9-12, 15-18, 21,22,24,25,28,31, 37-44, 46,47,48,49,50, 53-60,62,64,65,66 Previously Detected (int. disabled): 1-24,37-44,53-60
Redirect (302) ResponsesHTTP GET (Query String Parameters)53 out of 68Overall: 1-24,25,28,31, 37-44, 46,47,48,49,50, 53-60, 61,62,64,65,66 Path Traversal Detected: 1-24, 37-44, 53-60 Path Manipulation Detected: 25, 28, 31, 46,48,50,62,64,66 47,49,61,65, Previously Detected (int. disabled): 1-24,37-44,53-60
Redirect (302) ResponsesHTTP POST (Body Parameters)45 out of 68Overall: 1-6,9-12, 15-18, 21,22,24,25,28,31, 37-44, 46,47,48,49,50, 53-60,62,64,65,66 Previously Detected (int. disabled): 1-24,37-44,53-60
Erroneous 404 ResponsesHTTP GET (Query String Parameters)38 out of 68Overall: 1-3,9,10, 15,16,21,24,25,28,31, 37-44, 46,47,48,49,50, 53-60, 61,62,64,65,66 Previously Detected (int. disabled): 1,2,4,9,10,15,16,21,24,37-44,53-60
Erroneous 404 ResponsesHTTP POST (Body Parameters)36 out of 68Overall: 1-3, 9,10,15,16,21,24,25,28,31,37,39-44,46,47,48,49,50, 53,55-60,62,64,65,66 Previously Detected (int. disabled): 1,2,4,9,10,15,16,21,24,37,39-44,53,55-60
False Positive Lfi Test CasesHTTP GET (Query String Parameters)1 out of 8Case 02 (Case 01 also identifed, but a flaw/0day in JAVA at the time of testing actually caused the forward method to be vulnerable to Path Traversal)

The Remote File Inclusion Detection Accuracy of the Scanner:
Detection AccuracyChart
85.19% Detection Rate
0.00% False Positives
(92/108)
(0/6)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Errorneous 500 ResponsesHTTP POST (Body Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Errorneous 200 ResponsesHTTP GET (Query String Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Errorneous 200 ResponsesHTTP POST (Body Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Valid 200 ResponsesHTTP GET (Query String Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Valid 200 ResponsesHTTP POST (Body Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Identical 200 ResponsesHTTP GET (Query String Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Identical 200 ResponsesHTTP POST (Body Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Redirect (302) ResponsesHTTP GET (Query String Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Redirect (302) ResponsesHTTP POST (Body Parameters)8 out of 9Detected: Detected:1-4,5,7,8,9 (5,8,9 as file path manipulation) Previously Detected: 1-7 (only 1-4 on normal mode)
Erroneous 404 ResponsesHTTP GET (Query String Parameters)6 out of 9Detected: Detected:1,2,5,7,8,9 (5,8,9 as file path manipulation) Detected: 1,2,5,7 (only 1,2 on normal mode)
Erroneous 404 ResponsesHTTP POST (Body Parameters)6 out of 9Detected: Detected:1,2,5,7,8,9 (5,8,9 as file path manipulation) Detected: 1,2,5,7 (only 1,2 on normal mode)
False Positive Rfi Test CasesHTTP GET (Query String Parameters)0 out of 6None

WAVSEP Scan Log:
I defined Firefox to use burp as a proxy, accessed the various index pages (in different scans), used burp to crawl them all and verified that all the URLs were successfully crawled.
I then reduced the amount of threads to 1, disabled the "remove duplicate items" feature on the scan wizard, and occasionally the intelligent attack selection, verified that all the relevant scan plugins were enabled and executed the scan on various groups of URLs.
The following configuration values were consistently used:
Scan Options->Scan Speed -> Thorough
Scan Options->Scan Accuracy -> Minimize FP
*Use Intelligent Attack Selection

The WIVET Score of the Scanner:
Detection AccuracyChart
50.0% Detection Rate

WIVET Scan Log:
Initialized WIVET's session, limited the spider threads to 1 single thread, used firefox to populate burp with the index URL, defined fiddler as an upstream proxy and defined a valid session identifier using the the filter feature in fiddler, and finally, I edited menu.php in WIVET and excluded the logout URL (100.php).
I crawled wivet root URL twice before checking the result, and verified the results by running the whole process twice - the results were identical.

Copyright © 2010-2016 by Shay Chen. All rights reserved.
Click here to learn how this information may be published or reused.