What is N-Stalker?
N-Stalker Web Application Security Scanner X is a sophisticated Web Security Assessment solution for your web applications. By incorporating the well-known “N-Stealth HTTP Security Scanner” and its 39,000 Web Attack Signature database along with a patent-pending Component-oriented Web Application Security Assessment technology, N-Stalker is a “must have” security tool to developers, system/security administrators, IT auditors and staff.
How N-Stalker will help me?
If you are concerned about SQL injection and Cross-site scripting attacks, N-Stalker will sweep your Web Application for a large number of vulnerabilities, including well-known standards such as “OWASP Top 10” and “PCI Data Security”, and also custom security inspections to ensure your application’s Secure Development Life Cycle (SDLC).
What’s new in N-Stalker X
Parallel Spider Engine
N-Stalker debuts a new spider engine to allow simultaneous fetching of web resources. This new feature provides a more effective way to traverse your application and search for web interfaces. If you want to inspect multiple requests, just press “Track Spider” and follow N-Stalker’s HTTP activities on demand.
Improved Attack Engine
N-Stalker X attack modules are based on a customized engine running LUA language. It provides a flexible integration and allow for a fast introduction of new attack patterns. From OWASP Top 10 to CWE Top 25, N-Stalker X provides way to integrate your own signatures into his own inspection engine.
Enhanced Web Engine
Based on open-source engine, N-Stalker X supports all kind of modern technologies such as HTML5, Flash/Flex and Javascript language, including full support for asynchronous requests (Ajax experience). N-Stalker will interpret scripts and integrates your HTML’s DOM (Document Object Model) just like if a human-guided web browser was navigating through your application. Proprietary objects such as Shockwave/Flash applications will be easily processed allowing for a transparent crawling process.
Integrated Web Proxy for “drive-thru” attacks
An integrated web proxy in N-Stalker’s spider engine to allow for a drive-thru navigation and security testing for restricted and well-defined scopes. Just open your favorite browser, run your test cases and record well-known application transactions that can be used for an extended security assessment.
Support for Manual Security Analysis
N-Stalker Security Checks
》Web Engine N-Stalker |
ENTERPRISE |
INFRA |
Web Spider Module |
|
|
》Custom Design Errors |
ENTERPRISE |
INFRA |
Cross-site Script Injection Module |
|
|
Database Tampering – SQL Injection Module, including: |
|
|
– Direct mode |
|
|
– Blind mode |
|
|
Buffer & Integer Overflow attack Module |
|
|
Format String attack Module |
|
|
File & Directories Tampering Module, including: |
|
|
– Backup Files Discovery |
|
|
– Configuration Files Discovery |
|
|
– Password Files Discovery |
|
|
– Information Leakage Discovery |
|
|
Parameter Tampering Module, including: |
|
|
– Special Parameter Addition attacks |
|
|
– Boolean Parameter Tampering attacks |
|
|
– Hidden Parameter Discovery |
|
|
– Parameter Deletion attacks |
|
|
– Remote Execution attacks |
|
|
– File & Directory traversal attacks |
|
|
– Header Splitting & CRLF Injection attacks |
|
|
– Remote File Include PHP-based attacks |
|
|
Check for Suspicious Values in Web Form Hidden Fields |
|
|
Custom Signature Check (via Signature Editor) |
|
|
》Web Server Exposure |
ENTERPRISE |
INFRA |
Web Server Infrastructure Analysis Module, including: |
|
|
– Web Server & Platform version vulnerabilities |
|
|
– SSL encryption and X.509 certificate vulnerabilities |
|
|
– HTTP Method Discovery Module |
|
|
– HTTP Fingerprint Module, including: |
|
|
– Web Server Fingerprint Module |
|
|
– Web Server technology Discovery Module |
|
|
– Directory Brute-Force |
|
|
– HTTP Protocol vulnerabilities |
|
|
》Web Signature Attacks |
ENTERPRISE |
INFRA |
Web Attack Signatures Module, including: |
|
|
– IIS CGI Decode Test |
|
|
– IIS Extended Unicode Test |
|
|
– IIS File Parsing Test |
|
|
– FrontPage Security Test |
|
|
– Lotus Domino Security Test |
|
|
– General CGI Security Test |
|
|
– HTTP Devices Security Test (routers, switches) |
|
|
– Windows-based CGI Security Test |
|
|
– Windows-based CGI Security Test |
|
|
– PHP Web Application Security Test |
|
|
– ASP Web Application Security Test |
|
|
– J2EE Web Application Security Test |
|
|
– Coldfusion Web Application Security Test |
|
|
Attack templates such as: |
|
|
– Complete, SANS/FBI Top10, Top20 |
|
|
》Confidentiality Exposure Checks |
ENTERPRISE |
INFRA |
Look for Web forms vulnerabilities, including: |
|
|
– Password cache feature |
|
|
– Insecure method for sending data |
|
|
– Lack of Encryption for sensitive data |
|
|
– Insecure location to send data (leakage) |
|
|
– Find directory listing |
|
|
– Find available objects to download |
|
|
– Find meta-tag leakage |
|
|
– Find sensitive keywords in comments and scripts |
|
|
Compliance analysis, including: |
|
|
– Find Copyright statements |
|
|
– Find content rating statements |
|
|
– Find custom content on web pages and forms |
|
|
》Cookie Exposure Checks |
ENTERPRISE |
INFRA |
Cookie Security Analysis Module, including: |
|
|
– Find weakness in cookie information |
|
|
– Find cookies sent without encryption |
|
|
– Find information leakage in cookie information |
|
|
– Find cookies vulnerable to malicious client-side script |
|
|
》File & Directory Exposure Checks |
ENTERPRISE |
INFRA |
Search for backup files |
|
|
Search for information leakage files |
|
|
Search for configuration files |
|
|
Search for password files |
|
|