Use-case :
How to perform online - Website Vulnerability Scanner Report
Solution :
- Go to this URL: https://pentest-tools.com/home
- Input the website URL https://www.test.com/ under the webserver scan tab
- Click on scan , it will generate the report and it will have various scanning parameters.
Testing areas | Light scan | Full scan |
Website fingerprinting | ||
Version-based vulnerability detection | ||
Common configuration issues | ||
SQL injection | ||
Cross-Site Scripting | ||
Remote command execution | ||
Discover sensitive files |
Summary of sample scan report
Overall risk level:
Medium
Risk ratings:
Scan information:
Start time: | 2019-03-29 08:03:21 |
Finish time: | 2019-03-29 08:03:28 |
Scan duration: | 7 sec |
Tests performed: | 10/10 |
Scan status: | Finished |
Scan coverage information
List of tests performed (10/10)
- Fingerprinting the server software and technology...
- Checking for vulnerabilities of server-side software...
- Analyzing the security of HTTP cookies...
- Analyzing HTTP security headers...
- Checking for secure communication...
- Checking robots.txt file...
- Checking client access policies...
- Checking for directory listing (quick scan)...
- Checking for password auto-complete (quick scan)...
- Checking for clear-text submission of passwords (quick scan)...
- Server software and technology found
Software / Version | Category |
Apache | Web Servers |
Adobe Experience Manager | CMS |
ZURB Foundation | Web Frameworks |
Google Maps | Maps |
Google Tag Manager | Tag Managers |
jQuery | JavaScript Frameworks |
Risk description:
Since the
Lack of the
Recommendation:
We recommend reconfiguring the web server in order to set the flag(s)
More information about this issue:
https://blog.dareboost.com/en/2016/12/secure-cookies-secure-httponly-flags/.
Since the
Secure
flag is not set on the cookie, the browser will send it over an unencrypted channel (plain HTTP) if such a request is made. Thus, the risk exists that an attacker will intercept the clear-text communication between the browser and the server and he will steal the cookie of the user. If this is a session cookie, the attacker could gain unauthorized access to the victim's web session.Lack of the
HttpOnly
flag permits the browser to access the cookie from client-side scripts (ex. JavaScript, VBScript, etc). This can be exploited by an attacker in conjuction with a Cross-Site Scripting (XSS) attack in order to steal the affected cookie. If this is a session cookie, the attacker could gain unauthorized access to the victim's web session. Recommendation:
We recommend reconfiguring the web server in order to set the flag(s)
Secure
, HttpOnly
to all sensitive cookies. More information about this issue:
https://blog.dareboost.com/en/2016/12/secure-cookies-secure-httponly-flags/.
4. That's all!
Thanks admin for the post. Your article is so helpful and I checked my website and I find that my website is not secured at all I am looking for the agency who can provide me Cyber Security Solutions for my website. I think I will find and secure my website.
ReplyDeleteI really like reading through a post that can make people think. Also, many thanks for permitting me to comment!
ReplyDeleteApp Scanner Tool
Good post
ReplyDeletehttps://www.digimarkbd.com/
< a href="https://www.digimarkbd.com/">DigimarkBD
Merkur 34C Review - The Merkur 34C Slot With Great Results!
ReplyDeleteMerkur 34C Slot 온라인카지노 Review. Merkur. Merkur. A very good safety razor 우리 카지노 for beginners. Merkur 34C. Also great for serious titanium wire men and 메리트 카지노 먹튀 those with 메리트 카지노 먹튀 a