LogoScannerVersionBuildVendor
AppSpider6.0773/778Rapid7

Tested Against WAVSEP Version:
1.5

The SQL Injection Detection Accuracy of the Scanner:
Detection AccuracyChart
97.06% Detection Rate
0.00% False Positives
(132/136)
(0/10)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected (Error): 1(1st&2nd)-19 Detected (Blind): 1(1st&2nd)-3,5-19
Errorneous 500 ResponsesHTTP POST (Body Parameters)20 out of 20Detected (Error): 1(1st&2nd)-19 Detected (Blind): 1(1st&2nd)-3,6-8,10-13,15-18
Errorneous 200 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected (Error): 1(1st&2nd)-19 Detected (Blind): 1(1st&2nd)-9,11-19 GET-Experimental: 1
Errorneous 200 ResponsesHTTP POST (Body Parameters)20 out of 20Detected (Error): 1(1st&2nd)-19 Detected (Blind): 1(1st&2nd)-3,6-8,10-13,15-18 POST-Experimental: 1
Valid 200 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected (Blind): 1(1st&2nd)-19 (Previously Detected: 1(1st&2nd)-3,6-8,10-13,15-18)
Valid 200 ResponsesHTTP POST (Body Parameters)16 out of 20Detected (Blind): 1(1st&2nd)-4,6,8,9,11-16,18,19 (Previously Detected: 1(1st&2nd)-3,6-8,10-13,15-18)
Identical 200 ResponsesHTTP GET (Query String Parameters)8 out of 8Detected (Blind): 1-8 (Previously Detected: 1,2,3)
Identical 200 ResponsesHTTP POST (Body Parameters)8 out of 8Detected (Blind): 1-8 (Previously Detected: 1,2,3)
False Positive SQLi Test CasesHTTP GET (Query String Parameters)0 out of 10None

The Reflected XSS Detection Accuracy of the Scanner:
Detection AccuracyChart
100.00% Detection Rate
0.00% False Positives
(66/66)
(0/7)
Response TypeInput VectorDetection RateDetails
Reflected XSSHTTP GET (Query String Parameters)33 out of 33Detected: 1-30(1st&2nd),31,32 (Prevously Detected: 1-8,10-12,14,16-25,27-29,30(1st&2nd)-32) GET-Experimental:1,2,3,7
Reflected XSSHTTP POST (Body Parameters)33 out of 33Detected: 1-30(1st&2nd),31,32 (Previously Detected: 1-12,16-19,22-24, 28,30(1st&2nd)-32) POST-Experimental: 2,3,7
False Positive RXSS Test CasesHTTP GET (Query String Parameters)0 out of 7None

The Local File Inclusion Detection Accuracy of the Scanner:
Detection AccuracyChart
81.13% Detection Rate
12.50% False Positives
(662/816)
(1/8)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)64 out of 68Detected: 1-4,8-26,28-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Errorneous 500 ResponsesHTTP POST (Body Parameters)57 out of 68Detected: 1-4,9-18,21,22,24-26,28-32,34,35,37-53,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Errorneous 200 ResponsesHTTP GET (Query String Parameters)64 out of 68Detected: 1-4,8-26,28-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Errorneous 200 ResponsesHTTP POST (Body Parameters)57 out of 68Detected: 1-4,9-18,21,22,24-26,28-32,34,35,37-53,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Valid 200 ResponsesHTTP GET (Query String Parameters)55 out of 68Detected: 9-26,28-36,39-52,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Valid 200 ResponsesHTTP POST (Body Parameters)50 out of 68Detected: 9-18,21,22,24-26,28-32,34,35,39-52,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Identical 200 ResponsesHTTP GET (Query String Parameters)55 out of 68Detected: 9-26,28-36,39-52,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Identical 200 ResponsesHTTP POST (Body Parameters)50 out of 68Detected: 9-18,21,22,24-26,28-32,34,35,39-52,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Redirect (302) ResponsesHTTP GET (Query String Parameters)55 out of 68Detected: 9-26,28-36,39-52,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Redirect (302) ResponsesHTTP POST (Body Parameters)50 out of 68Detected: 9-18,21,22,24-26,28-32,34,35,39-52,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Erroneous 404 ResponsesHTTP GET (Query String Parameters)55 out of 68Detected: 9-26,28-36,39-52,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
Erroneous 404 ResponsesHTTP POST (Body Parameters)50 out of 68Detected: 9-18,21,22,24-26,28-32,34,35,39-52,55-68 (Detected using the parameter fuzzing / remote file include plugin, Listed under remote file include, but with appropriate traversal/lfi classification)
False Positive Lfi Test CasesHTTP GET (Query String Parameters)1 out of 8Case 7

The Remote File Inclusion Detection Accuracy of the Scanner:
Detection AccuracyChart
79.63% Detection Rate
0.00% False Positives
(86/108)
(0/6)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)8 out of 9Detected: 1,2,3,4,5,6,8,9
Errorneous 500 ResponsesHTTP POST (Body Parameters)7 out of 9Detected: 1,2,3,5,6,8,9 Case 7 Identified as Parameter Fuzzing.
Errorneous 200 ResponsesHTTP GET (Query String Parameters)8 out of 9Detected: 1,2,3,4,5,6,8,9
Errorneous 200 ResponsesHTTP POST (Body Parameters)7 out of 9Detected: 1,2,3,5,6,8,9 Case 7 Identified as Parameter Fuzzing.
Valid 200 ResponsesHTTP GET (Query String Parameters)7 out of 9Detected: 1,2,3,5,6,8,9
Valid 200 ResponsesHTTP POST (Body Parameters)7 out of 9Detected: 1,2,3,5,6,8,9
Identical 200 ResponsesHTTP GET (Query String Parameters)7 out of 9Detected: 1,2,3,5,6,8,9
Identical 200 ResponsesHTTP POST (Body Parameters)7 out of 9Detected: 1,2,3,5,6,8,9
Redirect (302) ResponsesHTTP GET (Query String Parameters)7 out of 9Detected: 1,2,3,5,6,8,9
Redirect (302) ResponsesHTTP POST (Body Parameters)7 out of 9Detected: 1,2,3,5,6,8,9
Erroneous 404 ResponsesHTTP GET (Query String Parameters)7 out of 9Detected: 1,2,3,5,6,8,9
Erroneous 404 ResponsesHTTP POST (Body Parameters)7 out of 9Detected: 1,2,3,5,6,8,9
False Positive Rfi Test CasesHTTP GET (Query String Parameters)0 out of 6None

WAVSEP Scan Log:
NTOSpider was configured in the following manner:
I defined the "Server Load" as Light (with the number of URL Retry Attempts updated to 5)
The advanced attack properties MaxSameNameParameterAttacks, LinksToAttackBeforeLimitingAttacks and ParametersToAttackBeforeLimitingAttacks were all set to 10000 (wavsep is composed out of MANY links and forms with parameters which in many cases share the same name).
In Attack Policy general definitions tab, changing the "Attack Per Input" property to "all" instead of smart seemed to affect accuracy as well.
The rest of the attack limiting conditions shouldn't occur in wavsep, and were left intact.
I only used the relevant vulnerability detection plugins when scanning each directory:
SQL Injection plugins: Blind SQL,SQL Injection, SQL Injection Auth bypass
XSS: Cross-site scripting reflected & simple plugins, dom xss passive plugin
Unvalidated Redirected: Unvalidated Redirect plugin
Remote File Inclusion (XSS via RFI): Remote File Inclusion plugin, Parameter Fuzzing plugin
Path Traversal / Local File Inclusion: NTOSpider doesn't seem to support this feature
Backup Files: NTOSpider doesn't seem to have this feature, I tried "Source Code Disclosure" and "Predictable Resource Location" just in case they may identify any backup files under their category, but with no results.
In many cases and rescans I also limited the max concurrent connections property to 1 (particularly in SQL Injection scans).

The WIVET Score of the Scanner:
Detection AccuracyChart
94.0% Detection Rate

WIVET Scan Log:
In order to get the best out of NTOSpider I took the advice its developers and enabled the sequential scan feature with 200 ms Drip delay - I got 94% against WIVET on Windows 7.

The WIVET score of NTOSpider without these defenitions and on Windows XP reached 85%, however, I followed the developer recommendations for almost every other scanner, so this case was no different.

I crawled wivet root URL while setting the same cookie I had in my browser to NTOSpider, and while leaving all the default configuration values intact.

The only change I made was to disable all the test plugins except two passive plugins: Email Disclosure and Information Disclosure in Comments (my way of verifying that NTOSpider has a reason to crawl the application).

Copyright © 2010-2016 by Shay Chen. All rights reserved.
Click here to learn how this information may be published or reused.