- Hooks within our customised browser engine allow the interception and analysis of Ajax calls whilst maintaining accurate client side state.
Sophisticated Assessment Techniques
CheckScan+ has been designed from the ground up to offer the most sophisticated scanning engine available. By working closely with industry leading penetration testers, each scanning module has been designed to maximise detection accuracy whilst minimising false positives.
- Thorough assessment of all known web application vulnerability classes such as those defined within the OWASP top ten.
- Decompilation and static analysis of Adobe Flash files.
- HTML5 postMessage analysis.
- Confirmation of discovered flaws through safe vulnerability exploitation
Advanced, platform agnostic fuzzing technology
CheckScan+ incorporates dynamic fuzzing technology whereby arbitrary protocol structures treated blindly by other scanners as opaque single inputs are broken down accurately into their true and deeper attack surface. For example, cookie values often encode multiple sub parameters using bespoke serialisation encodings (e.g. “the_cookie=1234|65[a=b;c=[1,2,3]]”), and so vulnerable server-side code paths are frequently missed using traditional fuzzing technology.
Eliminate False Positives through Vulnerability Exploitation
A false positive is where a vulnerability scanner indicates there is a vulnerability when in fact there isn’t one. Sorting through scanner results to determine which reported issues are real and which are false positive is a time-consuming process. To eliminate false positives, and to provide proof of concept evidence, CheckScan+ employs safe custom exploit techniques to actively confirm discovered vulnerabilities.
Microsoft Word and CSV reporting
With CheckScan+ you can download custom filtered results and view via HTML, Docx or CSV. CheckScan+ includes a simple JSON data API for retrieving, aggregating, processing and reporting raw vulnerability data for use in third party applications.
CheckScan+ allows you to create multiple (unlimited) user accounts to allow team collaboration. The system includes workflow management allowing you to assign and prioritise each vulnerability’s remediation to nominated members of the CommSec technical team who are managing your environment, or to nominated members of your own technical team if you wish.
Complex authentication schemes are supported when we are supplied with the minimal information, such as a username and password pair. Optionally, a login URL may be provided to direct the scanner where to use the credentials and for scenarios such as single sign-on. The scanner may easily be adapted to support bespoke authentication schemes that require non-standard credentials or processes.
CommSec can provide a comprehensive vulnerability assessment and analysis against remote hosts to determine if a misconfiguration exists that could allow an attack to get behind the application and into sensitive data.