2010
DOI: 10.1007/978-3-642-14215-4_7
|View full text |Cite
|
Sign up to set email alerts
|

Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners

Abstract: Abstract. Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click pentesting" tools that automatically evaluate the security of web applications with little or no human support. These tools access a web application in the same way users do, and, therefore, have the advantage of being independent of the particular technology used to implement the web application. However, these tools need to be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
129
0
7

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 156 publications
(139 citation statements)
references
References 5 publications
3
129
0
7
Order By: Relevance
“…We also used the Web Input Vector Extractor Teaser (WIVET) [30] benchmarking project to examine the crawling capabilities of the evaluated scanners. To assess the accuracy of each scanner, we calculated (1) the true positive rates (TPRs); (2) the true negative rates (TNRs); (3) the false positive rates (FPRs); (4) the false negative rates (FNRs); (5) the positive predictive values (PPVs); (6) the negative predictive values (NPVs); (7) and the false omission rates (FORs) [31,32]. We also measured the vulnerability detection accuracy of the evaluated scanners and their associatedmeasures.…”
Section: Web Vulnerability Scanners Selectionmentioning
confidence: 99%
See 1 more Smart Citation
“…We also used the Web Input Vector Extractor Teaser (WIVET) [30] benchmarking project to examine the crawling capabilities of the evaluated scanners. To assess the accuracy of each scanner, we calculated (1) the true positive rates (TPRs); (2) the true negative rates (TNRs); (3) the false positive rates (FPRs); (4) the false negative rates (FNRs); (5) the positive predictive values (PPVs); (6) the negative predictive values (NPVs); (7) and the false omission rates (FORs) [31,32]. We also measured the vulnerability detection accuracy of the evaluated scanners and their associatedmeasures.…”
Section: Web Vulnerability Scanners Selectionmentioning
confidence: 99%
“…Prior work has also addressed the performance of web security vulnerability scanners by either evaluating the detection effectiveness of a set of scanners [18,19,32,58] or developing techniques that can be incorporated into these tools to increase their detection accuracy [5,60,61]. Other research attempts focused on comparing the effectiveness of dynamic testing with other security testing approaches (e.g., static testing or manual code review) [62].…”
Section: Web Security Scanners: Detection Effectivenessmentioning
confidence: 99%
“…Previous research analyzing the effectiveness of black-box vulnerability scanners in discovering vulnerabilities in traditional client-server web applications demonstrated that these scanners are full of limitations and fall far short of the "point-and-click" tools that they aim to be. This research additionally concluded that the ability to crawl a web application is as important as the actual ability to detect vulnerabilities [31].…”
Section: Black-box Vulnerability Scannersmentioning
confidence: 93%
“…One common approach that these tools employ is "fuzzing," in which they bombard the application's input parameters with input data in an attempt to trigger a vulnerability. Fuzzing is a simple technique that offers a high benefit-cost ratio, especially because it accesses a web application in the same way users do and can be utilized independent of the technology that powers the web-application [31,76]. Although more sophisticated tools use intelligent heuristics to perform their attacks, fuzzing alone cannot provide a complete picture of the overall security and must be used in conjunction with other techniques.…”
Section: The Crawl Modulementioning
confidence: 99%
See 1 more Smart Citation