Working with custom security checks in Netsparker

Tuncay Kayaoglu - Fri, 23 Apr 2021 -

Netsparker comes with thousands of carefully crafted automated security checks to identify vulnerabilities in a wide variety of modern web applications. But when you want to dive deeper into the scanning process or define application-specific tests, Netsparker also provides the option of writing custom security checks using nothing more than a bit of JavaScript.

Your Information will be kept private.

Working with custom security checks in Netsparker

How Netsparker runs security checks

Operating as a black-box web vulnerability scanner, Netsparker probes and examines your application from the outside, exactly as an attacker would. During testing, Netsparker visits every link that its crawler detects and makes requests to all input points in detected resources, including the URLs used to reach these resources. Next, it safely performs test attacks on the target application by sending suitable attack payloads to the identified input points. Finally, it analyzes the responses to detect vulnerabilities in the web application.

Built-in and custom security checks

To identify vulnerabilities, Netsparker uses thousands of built-in security checks, incorporating over a decade of continuous security research and development for maximum coverage and accuracy. But every application environment is different, so occasionally you may want to add a custom check to test application-specific assets or payloads. With its custom scripts for security checks feature, Netsparker Enterprise lets you write custom security checks in JavaScript. Once they are added to your account, you can use custom scripts in a custom scan policy to scan specific URLs or entire sites. 

Types of custom security checks in Netsparker

Custom security checks in Netsparker fall into four categories, depending on the scope of testing and type of attack activity: active, passive, singular, and per-directory.

Active security checks

With custom active security checks in Netsparker, you can define your own attack patterns. During the test attack phase, Netsparker will inject these custom attack patterns into parameters discovered by the crawler. Each attack pattern you provide in your custom script will result in one HTTP request for each parameter discovered by the crawler. 

You can specify the type of parameters that will be targeted for injection. For example, you may choose to attack only JSON parameters but not query string or POST body parameters. After Netsparker sends the attack request and receives a response, you can then examine the HTTP response to decide if the injected attack pattern has revealed a vulnerability.

Passive security checks

Passive security checks do not issue any extra HTTP requests during scans. You can write passive security check scripts to analyze the responses received by the crawler for each endpoint. If the response contains sensitive information or other undesirable data, you can then raise a new vulnerability in Netsparker.

Singular security checks

These are similar to passive security checks but executed only once for each scan, which is useful for checking headers and similar data. You can analyze the response of the target URL for the scan and raise vulnerabilities if necessary.

Per-directory security checks

These are very similar to active security checks but executed once for every directory (URL segment). Generally, you should write per-directory security checks if you want to check for the existence of certain files in the directories of the target web application, for example, known resources that are not linked anywhere in the web application.

Writing a custom security check

Custom security checks in Netsparker are coded in JavaScript, so you don’t need to learn another scripting language to write them. Our support page provides detailed documentation about writing security checks, but let’s take a quick look at a simple script to learn the basics. Here is a sample script for a custom active security check:

var attacks = [
  {
    id: '8613F6DB-9AD2-4E45-9B8F-308C810FF7DB',
    name: 'My New Pattern',
    attack: '%27AND+1%3dcast(0x5f21403264696c656d6d61+as+varchar(8000))+or+%271%27%3d%27',
    attackUsage: AttackUsages.Json + AttackUsages.Xml
  }
];

function analyze(context, response) {
  if (response.Body.indexOf('iNj3Ct3D') > -1) {
    return new Vulnerability(VulnerabilityType.PossibleSqlInjection);
  }
}

The script consists of two parts: a list of attack definitions and a response analysis function. An attack definition includes the following properties: id, name, attack, and (optionally) attackUsage. The id must be in the GUID format and unique. The name is what will be displayed in your custom scan policy, while the attack property specifies the payload that will be injected into request parameters.

The optional attackUsage property defines the type of parameters into which the attack will be injected (query string and POST parameters by default). You can combine multiple values using the addition symbol. Netsparker automatically encodes the payload using the right method for the parameter type, unless you add the optional attackEncoded property to indicate that the attack is already encoded.

The second part of the script is response analysis. The analyze() function is executed for every response to an attack request made during the scan. The function takes two parameters: context and response. The context variable includes information about the current attack context, while response represents the HTTP response returned by the web server in reaction to an attack pattern specified in attacks.

If you decide that the response indicates a vulnerability, you can return a new Vulnerability object with a suitable vulnerability type. In this example, the function checks if the response body contains a specific test string and if so, it returns a Vulnerability object corresponding to an SQL injection.

Adding your custom security check to Netsparker Enterprise

Once the script is ready, you will need to get in touch with your in-house Netsparker Enterprise administrator or a Netsparker support engineer to add the script to your account (depending on the deployment type). You then need to decide what type of vulnerability the script will raise and specify a vulnerability name, severity, and description to display in the Netsparker UI and reports. The next step is to create a custom report policy, add your custom check to it, and finally add the script to your account (again, for on-demand deployments, this is done by a Netsparker support engineer).

With your custom security check ready, you can now scan a specific URL or an entire site to see if Netsparker identifies the vulnerability type defined in your script. Scanning a specific URL is only possible after Netsparker has scanned the whole site at least once. After that, you can navigate to Custom Scripts under Policies in the main menu and execute your custom script after selecting the URL. When Netsparker executes your custom security check, you will see a message indicating whether a vulnerability was found. For more information, see Executing a custom script on a web page.

Scanning targets with your custom script

To scan an entire website with your custom security script, you first need to create a custom scan policy. As a Netsparker support engineer has already created a custom report policy for your custom checks, you can now start scanning your website to identify the vulnerability specified in your script. To do this, simply create a new scan and select your custom scan and report policies. For more information, see Scanning a website with a custom security script.

If vulnerabilities defined in your custom script are found during the scan, they will be displayed in the scan report and the Sitemap tree under the relevant site node. If vulnerabilities are expected but not found, you may want to check your script code. You can modify and execute the script as many times as you want until you see the expected result in the report and the Sitemap tree.

Complementing Netsparker’s highly accurate vulnerability detection technology with Proof-Based Scanning™, the ability to write custom testing scripts lets you maximize test coverage by adding application-specific checks. For more information and FAQs about working with custom scripts in Netsparker, see Custom scripts for security checks in Netsparker Enterprise.

Your Information will be kept private.

Tuncay Kayaoglu

About the Author

Tuncay Kayaoglu

Technical Writer at Netsparker. He does his best to make complex issues simple.