LogoScannerVersionBuildVendor
Netsparker4.1.1.02015.06.16.1433Netsparker Ltd

Tested Against WAVSEP Version:
1.5

The SQL Injection Detection Accuracy of the Scanner:
Detection AccuracyChart
100.00% Detection Rate
0.00% False Positives
(136/136)
(0/10)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected: 1(1st&2nd)-19
Errorneous 500 ResponsesHTTP POST (Body Parameters)20 out of 20Detected: 1(1st&2nd)-19
Errorneous 200 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected: 1(1st&2nd)-19 200-Experimental-GET: 1
Errorneous 200 ResponsesHTTP POST (Body Parameters)20 out of 20Detected: 1(1st&2nd)-19 200-Experimental-POST: 1
Valid 200 ResponsesHTTP GET (Query String Parameters)20 out of 20Detected: 1(1st&2nd)-19
Valid 200 ResponsesHTTP POST (Body Parameters)20 out of 20Detected: 1(1st&2nd)-19
Identical 200 ResponsesHTTP GET (Query String Parameters)8 out of 8Detected: 1-8
Identical 200 ResponsesHTTP POST (Body Parameters)8 out of 8Detected: 1-8
False Positive SQLi Test CasesHTTP GET (Query String Parameters)0 out of 10None

The Reflected XSS Detection Accuracy of the Scanner:
Detection AccuracyChart
100.00% Detection Rate
0.00% False Positives
(66/66)
(0/7)
Response TypeInput VectorDetection RateDetails
Reflected XSSHTTP GET (Query String Parameters)33 out of 33Detected: 1-30(1st&2nd), 31,32 XSS-GET-Experimental: 1,3,4,7, Possible: 8-11, FH/BTH: 5,6 (Previously Detected: 1-26,28-30(1st&2nd), 31,32) Experimental-GET: 1,3,4
Reflected XSSHTTP POST (Body Parameters)33 out of 33Detected: 1-30(1st&2nd), 31,32 XSS-POST-Experimental: 1,3,4,7, Possible: 8-11, FH/BTH: 5,6 (Previously Detected: 1-26,28-30(1st&2nd), 31,32) Experimental-POST: 1,3,4
False Positive RXSS Test CasesHTTP GET (Query String Parameters)0 out of 7None

The Local File Inclusion Detection Accuracy of the Scanner:
Detection AccuracyChart
100.00% Detection Rate
0.00% False Positives
(816/816)
(0/8)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Errorneous 500 ResponsesHTTP POST (Body Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Errorneous 200 ResponsesHTTP GET (Query String Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Errorneous 200 ResponsesHTTP POST (Body Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Valid 200 ResponsesHTTP GET (Query String Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Valid 200 ResponsesHTTP POST (Body Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Identical 200 ResponsesHTTP GET (Query String Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Identical 200 ResponsesHTTP POST (Body Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Redirect (302) ResponsesHTTP GET (Query String Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Redirect (302) ResponsesHTTP POST (Body Parameters)68 out of 68Detected: 1-68 (Previously Detected - Confirmed: 1,3,5,7,9-24,38,40,42,44,54,56,58,60 Probable: 37,53 Possible: 28-30,39,47,48,55,63,64)
Erroneous 404 ResponsesHTTP GET (Query String Parameters)68 out of 68Full Score Required MAX 404 to be set to 250 or more. Might be Fixed in Newest Release. Detected: 1-68 (Previously Detected: 1-17,21,24,25,28,31,34,37-68)
Erroneous 404 ResponsesHTTP POST (Body Parameters)68 out of 68Full Score Requires MAX 404 to be set to 250 or more. Might be Fixed in Newest Release. Detected: 1-68 (Previously Detected: 1-17,21,24,25,28,31,34,37,39-44,46-53,55-60,62-68)
False Positive Lfi Test CasesHTTP GET (Query String Parameters)0 out of 8None

The Remote File Inclusion Detection Accuracy of the Scanner:
Detection AccuracyChart
100.00% Detection Rate
0.00% False Positives
(108/108)
(0/6)
Response TypeInput VectorDetection RateDetails
Errorneous 500 ResponsesHTTP GET (Query String Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Errorneous 500 ResponsesHTTP POST (Body Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Errorneous 200 ResponsesHTTP GET (Query String Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Errorneous 200 ResponsesHTTP POST (Body Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Valid 200 ResponsesHTTP GET (Query String Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Valid 200 ResponsesHTTP POST (Body Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Identical 200 ResponsesHTTP GET (Query String Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Identical 200 ResponsesHTTP POST (Body Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Redirect (302) ResponsesHTTP GET (Query String Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Redirect (302) ResponsesHTTP POST (Body Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Erroneous 404 ResponsesHTTP GET (Query String Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
Erroneous 404 ResponsesHTTP POST (Body Parameters)9 out of 9Detected: 1-9 (XSS via RFI) (Previously Detected: 1-4)
False Positive Rfi Test CasesHTTP GET (Query String Parameters)0 out of 6None

WAVSEP Scan Log:
Since I was already familiar with Netsparker, I was aware of an optimization feature called Heuristic URL Rewrite Support which is supposed to prevent the tool from re-scanning similar URLs ? and since this feature affects the accuracy of wavsep assessments, it was disabled for the purposes of the various scans (in each one of the default and custom scan policies I used).
The scanning process was performed with 1-6 threads, while enabling only the relevant set of plugins for each directory (LFI/RFI, XSS & All the SQLI Plugins, Backup Files and Redirect).
Whenever there was a suspicion of thread collision or other non-scanner related accuracy issue, I rescanned a smaller group of URLs with fewer threads, to verify the results.

While defining cusom policies, I used the vendor recommended WAVSEP configuration which is available online -

In addition to disabling the URL Rewrite detection, In the configuration I enabled Wait Resource Finder , Text Parser , Fallback To Get and Analyze Javascript / AJAX options under Crawling section, Set the Max 404 pages to attack to 250, the directory name under set common directory value to 150, enabled the Simulate All feature in the Open Redirection section, and enabled the Bypass Scope for Static Checks feature under the scope section.

After stubmling on what seemed to be a gui configuration bug (reported to the vendor and fixed), I extended the amount of Max 404 pages to attack in the configuration to 2500 for all obsolete file scans - which seemed to have a positive affect on both detection and false positive reduction.
I used the "Static Resources", "Signatures", "HTML Content", "Backup Files" and "Common Directories" (150 directory names) plugins for the obsolete / hidden file scans (I also scanned with the "All Checks" policy to verify I didn't miss any plugins),

The WIVET Score of the Scanner:
Detection AccuracyChart
92.0% Detection Rate

WIVET Scan Log:
I Initialized WIVET's session, Selected a custom passive policy, defined a valid session identifier and excluded the logout URLs (logout.php, 100.php).

Copyright © 2010-2016 by Shay Chen. All rights reserved.
Click here to learn how this information may be published or reused.