Download Netsparker
Pricing
Blog
Contact
Netsparker

Understand Your Web Application Better with Netsparker Knowledge Base Nodes

Malicious website hack attacks do not just happen when someone successfully exploits a web application vulnerability. Many attacks are successful because an attacker discovered a hidden admin interface while analysing the developer comments in the code, or because the attacker found some debug information in an error code that gave him enough information to connect directly to some backend portal or database.

Therefore a web vulnerability scanner should report much more than just exploitable web application vulnerabilities. And that is where Netsparker excels; Netsparker Desktop and Netsparker Cloud are not just web vulnerability scanners that automatically identify vulnerabilities in web applications. They are all rounder web security tools that can highlight other potential security issues which are typically not classified as “vulnerabilities” but help attackers gain additional knowledge and craft a successful hack attack against a web application.

Netsparker scanners provide the user with a complete detailed analysis of the target web application. All of this information can be found under the knowledge base node, in the sitemap section. Below is a complete list of all knowledge base nodes and the information they present to the user.

Out of Scope Links

In the Out of Scope Links knowledge base node Netsparker lists all the links found in the target web application but do not fall under the scanning scope, hence they won’t be been scanned.

From this knowledge base node users can determine what was not scanned and why so they can fine tune their security scan settings should they wish to also scan these links.

Out of Scope Links Knowledge Base Node on Netsparker

Interesting Headers

In the Interesting Headers knowledge base node Netsparker lists all the unusual HTTP headers encountered during the security scan of the target web application. Such information is very useful for quality assurance teams; it can lead them to discover any legacy or unused components which are still being called because some unused code is still enabled in the system.

Such information can also help security professionals uncover more information about the target web applications and the environment it is running in. For example they can find out if a load balancer or web application firewall is in use and can help them determine the version of some of the server components for more targeted  testing.

Interesting Headers knowledge base node in Netsparker

Web Pages with Inputs

In this knowledge base node Netsparker lists all of the target’s web application pages that have an input. This list can be used by developers and quality assurance members for further manual testing. Security professionals find such information useful as well since it gives them a better overview of the attack surfaces of a web application.

List of Web Pages with inputs in Netsparker knowledge base node

MIME Types

In this knowledge base node Netsparker lists all the MIME Types discovered on the target web application. Under each MIME type Netsparker also lists all the files with such MIME type. Such information is very handy in case further manual testing is required. It also helps security professionals spot any unusual file / type served by the server which could also be a result of a successful hack.

Netpsarker will show all the different MIME types used on target website in a knowledge base node

File Extensions

In this knowledge base node Netsparker lists all the different file extensions identified on the target web application. Under each extension it will also list down all the files with such an extension. Although this information might not contain a lot of juicy information, it helps security professionals determine what is being served from the target web application.

List of different file extensions identified on target web application listed in Netsparker knowledge base node

Email Addresses

In this knowledge base node Netsparker lists all the email addresses identified on the target web application. Although having clear text email addresses on a website is not a vulnerability in itself, it is good to know that email addresses are published on the website.

List of email addresses identified on target web application listed in Netsparker knowledge base node

Embedded Objects

In this knowledge base node Netsparker lists all the embedded objects such as Flash file or ActiveX component discovered on the target web application and their location.

Embedded objects identified on target web application listed in Netsparker knowledge base node

External Scripts

In this knowledge base node Netsparker lists all the external scripts identified on the target web application. An external script from a non-trusted source should be considered as a security risks, since it might be tampered by someone else to execute malicious javascript on the target web application. Such tampering might result in a stored or permanent Cross-Site Scripting vulnerability.

Information in this knowledge base node can also help users determine if the target web application have been already hacked, for example malware is being distributed via an injected script. All (un)trusted 3rd party scripts used on your web application are also listed in this knowledge base node.

List of external scripts identified on target website in Netsparker knowledge base node

External Frames

In this knowledge base node Netsparker lists all the frames on the target web application which originate from an external source. Similar to external scripts, external frames might be the result of an already hacked website, hence it is good for security professionals to know about all of the external objects in a web application.

List of external frames identified on target web application in Netsparker knowledge base node

Comments

In this knowledge base node Netsparker lists all the source code comments identified on the target web application and highlights keywords which might contain sensitive information. Most probably this is the most overlooked security issue of all and could lead to sensitive information disclosure.

For example imagine what a comment such as the below can lead to:

<!-- similar to admin pages in /hiddenadmin/ -->

If such a comment is found by malicious attackers they know that there is some sort of hidden admin area which might give them more information or access to the admin portal. It is very typical for developers to leave very sensitive information on web applications such as connection strings, administrative accounts credentials, details of the test environment and much more.

Netsparker will automatically find and crawl identified paths in the comments but there is much more that can be left in the comments by the developers.

Developer comments in source code identified in target web application listed in Netsparker knowledge base node

Netsparker also allows users to add new entries to the list of sensitive comments so they are alerted once such entry is identified in the source code comments. Users can also modify the existing patterns from the Comments node in the Netsparker settings as seen in the below screenshot.

Configuring developer comments highlights in Netsparker web application security scanner

JavaScript Files

In this knowledge base node Netsparker lists all the JavaScripts identified on the target website. Security professionals can refer to this centralized list of information to check that all JavaScripts on the target website are secure and are being used appropriately, rather than having to manually browse through the website and find them manually, risking to miss some of them.

List of JavaScript files identified on target web application by Netsparker listed in the knowledge base node

Cookies

In this knowledge base node Netsparker lists all the cookies used by the target website. Cookies can disclose a lot of information about the target website that attackers can use to craft a malicious attack. For example cookies can store strings such as “admin=false” or “debugging=1”.

From this node security professionals have access to a centralized list of all cookies so they can analyse them one by one and identify any cookie related security issues.

Cookies used on target website listed in a Netsparker knowledge base node

Web Services

In this knowledge base node Netsparker will report any identified web services running on the target web application and their operations.

List of identified web service in Netsparker knowledge base node

CSS Files

In this knowledge base node Netsparker lists all the CSS files used on the target web application. Modern web applications have dynamic CSS files (CSS files that accept input from other sources and variables) hence they can also be an attack vector. And even though Netsparker automatically scans target web applications for potential vulnerabilities in CSS files such list is handy, especially in case users need to manually analyze them.

XSS Files node in Knowledge base

Slowest Pages

In this knowledge base node Netsparker reports the average response time of the target web application and lists down all the pages with high response time. As such pages which are slow to load do not pose any security threat, but there is a reason why they are taking longer to load. Typically this could be caused by errors in the code or the code's logic is not efficient, hence still worth knowing about them so you can troubleshoot them.

Netsparker reporting the slowest pages on a target website in the Slowest Pages knowledge base node

SSL

In this knowledge base node Netsparker lists the information about the SSL certificate used on the target website, and the protocols and ciphers which are supported by the target server. In the last few years there have been a good number of issues with old ciphers and protocols hence it is good to know what the target web application supports so you can fine tune the server's configuration.

SSL knowledge base node in Netsparker

URL Rewrite

In this knowledge base node Netsparker lists down the URL Rewrite rules it automatically created when scanning the target website.

Netsparker scanners automatically configure their own URL rewrite rules when scanning a website that uses URL rewrite, hence you do not have to manually configure them. And should you need to verify the rules or get a better understanding of the workings and setup of the target web application you can always check the rules that the scanner automatically configured.

URL Rewrite rules knowledge base node reporting the URL rewrite rules Netsparker automatically configured during a scan.

REST API

If the scanner identifies a REST API on the target web application during a scan, Netsparker will automatically crawl and scan the RESTful web service. RESTful web services that are identified automatically are listed under the Knowledge Base node, as per the below screenshot.

Netsparker automatically identified a REST API web service on the target web application.

Identifying All Web Application Security Threats

As this article highlights there is much more to web application security than just identifying and remediating exploitable vulnerabilities, and this is where Netsparker Web Application Security Scanner plays a good role. Web security professionals should take advantage of such tools and use all of the information provided to their advantage.

Netsparker centralizes all information to helps security professionals understand better the target web application and identify any security issues that are not “exploitable vulnerabilities” yet expose information to malicious attackers and lead them to a successful hack attack.

Netsparker Wep Application Security Scanner Find and Exploit vulnerabilities in Web Applications with Netsparker

Request Demo version of Netsparker ProfessionalorBuy Netsparker Professional

Follow us