What is N-Stalker?
N-Stalker Web Application Security Scanner X is a sophisticated Web Security Assessment solution for your web applications. By incorporating the well-known “N-Stealth HTTP Security Scanner” and its 39,000 Web Attack Signature database along with a patent-pending Component-oriented Web Application Security Assessment technology, N-Stalker is a “must have” security tool to developers, system/security administrators, IT auditors and staff.
How N-Stalker will help me?
If you are concerned about SQL injection and Cross-site scripting attacks, N-Stalker will sweep your Web Application for a large number of vulnerabilities, including well-known standards such as “OWASP Top 10” and “PCI Data Security”, and also custom security inspections to ensure your application’s Secure Development Life Cycle (SDLC).
What’s new in N-Stalker X
Parallel Spider Engine

N-Stalker debuts a new spider engine to allow simultaneous fetching of web resources. This new feature provides a more effective way to traverse your application and search for web interfaces. If you want to inspect multiple requests, just press “Track Spider” and follow N-Stalker’s HTTP activities on demand.
Improved Attack Engine

N-Stalker X attack modules are based on a customized engine running LUA language. It provides a flexible integration and allow for a fast introduction of new attack patterns. From OWASP Top 10 to CWE Top 25, N-Stalker X provides way to integrate your own signatures into his own inspection engine.
Enhanced Web Engine

Based on open-source engine, N-Stalker X supports all kind of modern technologies such as HTML5, Flash/Flex and Javascript language, including full support for asynchronous requests (Ajax experience). N-Stalker will interpret scripts and integrates your HTML’s DOM (Document Object Model) just like if a human-guided web browser was navigating through your application. Proprietary objects such as Shockwave/Flash applications will be easily processed allowing for a transparent crawling process.
Integrated Web Proxy for “drive-thru” attacks

An integrated web proxy in N-Stalker’s spider engine to allow for a drive-thru navigation and security testing for restricted and well-defined scopes. Just open your favorite browser, run your test cases and record well-known application transactions that can be used for an extended security assessment.
Support for Manual Security Analysis

N-Stalker Security Checks
》Web Engine N-Stalker |
ENTERPRISE |
INFRA |
Web Spider Module |
 |
 |
》Custom Design Errors |
ENTERPRISE |
INFRA |
Cross-site Script Injection Module |
 |
 |
Database Tampering – SQL Injection Module, including: |
 |
 |
– Direct mode |
 |
 |
– Blind mode |
 |
 |
Buffer & Integer Overflow attack Module |
 |
 |
Format String attack Module |
 |
 |
File & Directories Tampering Module, including: |
 |
 |
– Backup Files Discovery |
 |
 |
– Configuration Files Discovery |
 |
 |
– Password Files Discovery |
 |
 |
– Information Leakage Discovery |
 |
 |
Parameter Tampering Module, including: |
 |
 |
– Special Parameter Addition attacks |
 |
 |
– Boolean Parameter Tampering attacks |
 |
 |
– Hidden Parameter Discovery |
 |
 |
– Parameter Deletion attacks |
 |
 |
– Remote Execution attacks |
 |
 |
– File & Directory traversal attacks |
 |
 |
– Header Splitting & CRLF Injection attacks |
 |
 |
– Remote File Include PHP-based attacks |
 |
 |
Check for Suspicious Values in Web Form Hidden Fields |
 |
 |
Custom Signature Check (via Signature Editor) |
 |
 |
》Web Server Exposure |
ENTERPRISE |
INFRA |
Web Server Infrastructure Analysis Module, including: |
 |
 |
– Web Server & Platform version vulnerabilities |
 |
 |
– SSL encryption and X.509 certificate vulnerabilities |
 |
 |
– HTTP Method Discovery Module |
 |
 |
– HTTP Fingerprint Module, including: |
 |
 |
– Web Server Fingerprint Module |
 |
 |
– Web Server technology Discovery Module |
 |
 |
– Directory Brute-Force |
 |
 |
– HTTP Protocol vulnerabilities |
 |
 |
》Web Signature Attacks |
ENTERPRISE |
INFRA |
Web Attack Signatures Module, including: |
 |
 |
– IIS CGI Decode Test |
 |
 |
– IIS Extended Unicode Test |
 |
 |
– IIS File Parsing Test |
 |
 |
– FrontPage Security Test |
 |
 |
– Lotus Domino Security Test |
 |
 |
– General CGI Security Test |
 |
 |
– HTTP Devices Security Test (routers, switches) |
 |
 |
– Windows-based CGI Security Test |
 |
 |
– Windows-based CGI Security Test |
 |
 |
– PHP Web Application Security Test |
 |
 |
– ASP Web Application Security Test |
 |
 |
– J2EE Web Application Security Test |
 |
 |
– Coldfusion Web Application Security Test |
 |
 |
Attack templates such as: |
 |
 |
– Complete, SANS/FBI Top10, Top20 |
 |
 |
》Confidentiality Exposure Checks |
ENTERPRISE |
INFRA |
Look for Web forms vulnerabilities, including: |
 |
 |
– Password cache feature |
 |
 |
– Insecure method for sending data |
 |
 |
– Lack of Encryption for sensitive data |
 |
 |
– Insecure location to send data (leakage) |
 |
 |
– Find directory listing |
 |
 |
– Find available objects to download |
 |
 |
– Find meta-tag leakage |
 |
 |
– Find sensitive keywords in comments and scripts |
 |
 |
Compliance analysis, including: |
 |
 |
– Find Copyright statements |
 |
 |
– Find content rating statements |
 |
 |
– Find custom content on web pages and forms |
 |
 |
》Cookie Exposure Checks |
ENTERPRISE |
INFRA |
Cookie Security Analysis Module, including: |
 |
 |
– Find weakness in cookie information |
 |
 |
– Find cookies sent without encryption |
 |
 |
– Find information leakage in cookie information |
 |
 |
– Find cookies vulnerable to malicious client-side script |
 |
 |
》File & Directory Exposure Checks |
ENTERPRISE |
INFRA |
Search for backup files |
 |
 |
Search for information leakage files |
 |
 |
Search for configuration files |
 |
 |
Search for password files |
 |
 |