You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: appsec-portal/scanners/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ Here are the details of each **importer** supported by AppSec Portal
41
41
42
42
***`Arachni`**: imports scan results from [**Arachni Scanner**](scanner-description/web-scanners/arachni-scan.md), which is a tool for scanning modern web applications for a variety of vulnerabilities including SQL injection, cross-site scripting, file inclusion, and more.
43
43
***`Acunetix`** : imports scan results from [**Acunetix**](scanner-description/web-scanners/acunetix.md), a scanner designed to detect vulnerabilities in web applications.
44
-
***`Burpsuit`**: imports scan results from [**BurpSuit Enterprise scanner**](scanner-description/web-scanners/burpsuit-enterprise.md), which is a tool for automated web application security testing and vulnerability scanning.
44
+
***`Burpsuit`**: imports scan results from [**BurpSuit Enterprise scanner**](scanner-description/web-scanners/burp-enterprise-scan.md), which is a tool for automated web application security testing and vulnerability scanning.
45
45
***`OWASP Zap`**: is responsible for importing scan results from [**GitLab****OWASP Zap Scanner**](scanner-description/web-scanners/owasp-zap.md), wich is a security testing tool focused on web application vulnerabilities, including SQL injection, cross-site scripting (XSS), and more.
Copy file name to clipboardexpand all lines: appsec-portal/scanners/scanner-description/web-scanners/acunetix.md
+21
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,27 @@ description: >-
6
6
7
7
# Acunetix
8
8
9
+
**AppSec Portal Importer Name**: Acunetix Scan
10
+
9
11
[Acunetix](https://www.acunetix.com/) is a specialized scanner designed to detect **vulnerabilities** in **web applications**. It provides a comprehensive solution for identifying security issues that could potentially compromise the security of web applications.
10
12
11
13
Acunetix scans web applications by performing a thorough examination of their code, configuration, and functionality. It is equipped to discover a wide range of security vulnerabilities, including but not limited to SQL injection, cross-site scripting (XSS), security misconfigurations, and more. This extensive coverage ensures that web application developers and security professionals can identify and address potential threats effectively.
In this command, the following parameters are used:
24
+
25
+
1.`-X POST`: specifies the HTTP method to be used (in this case, POST)
26
+
2.`-H "Authorization: Token <authorization_token>"`: specifies the [**authorization token**](../../importing-reports-from-scanners-to-appsec-portal/#authorization-token) obtained from AppSec Portal.
27
+
3.`-H "Content-Type: multipart/form-data"`: specifies the content type of the request.
28
+
4.`-F "file=@<report_file_path>"`: specifies the **path to the report file** generated by the scanner.
29
+
5.`-F "product_name=<product_name>"`: specifies the **name of the product** being scanned.
30
+
6.`-F "product_type=<product_type>"`: specifies the **type of the product** being scanned.
31
+
7.`-F "scanner_name=<scanner_name>"`: specifies the **name of the scanner** used to generate the report (Bandit Scan or GitLab Bandit)
32
+
8.`-F "branch=<branch_name>"`: (_optional_) specifies the name of the branch in the source code repository (if applicable) This parameter is particularly useful when you want to associate the scan results with a specific branch in your repository. If not provided, the scan will be associated with the default branch
It utilizes a combination of black-box scanning techniques and a comprehensive set of built-in checks to assess the security posture of web applications.
10
14
11
-
One of the notable features of Arachni is its ability to crawl and scan web applications in a way that **mimics the behavior of a real user**. This allows the scanner to detect vulnerabilities that would not be visible through a standard scan. Arachni also has the ability to identify vulnerabilities in various technologies and programming languages including **PHP**, **Ruby on Rails**, and **Java**.
15
+
One of the notable features of [Arachni](https://github.com/Arachni/arachni) is its ability to crawl and scan web applications in a way that **mimics the behavior of a real user**. This allows the scanner to detect vulnerabilities that would not be visible through a standard scan. Arachni also has the ability to identify vulnerabilities in various technologies and programming languages including **PHP**, **Ruby on Rails**, and **Java**.
In this command, the following parameters are used:
26
+
27
+
1.`-X POST`: specifies the HTTP method to be used (in this case, POST)
28
+
2.`-H "Authorization: Token <authorization_token>"`: specifies the [**authorization token**](../../importing-reports-from-scanners-to-appsec-portal/#authorization-token) obtained from AppSec Portal.
29
+
3.`-H "Content-Type: multipart/form-data"`: specifies the content type of the request.
30
+
4.`-F "file=@<report_file_path>"`: specifies the **path to the report file** generated by the scanner.
31
+
5.`-F "product_name=<product_name>"`: specifies the **name of the product** being scanned.
32
+
6.`-F "product_type=<product_type>"`: specifies the **type of the product** being scanned.
33
+
7.`-F "scanner_name=<scanner_name>"`: specifies the **name of the scanner** used to generate the report (Arachni Scan)
34
+
8.`-F "branch=<branch_name>"`: (_optional_) specifies the name of the branch in the source code repository (if applicable) This parameter is particularly useful when you want to associate the scan results with a specific branch in your repository. If not provided, the scan will be associated with the default branch
35
+
36
+
Asset information, if an [auditor ](broken-reference)is used
37
+
38
+
9.`-F "repository=<repository SSH URL>"`: If your product is **code** in a repository enter the address of your **repository** in a specific format, for example: git@gitlab.com:whitespots-public/appsec-portal.git
39
+
10. \-F "docker\_image=\<registry address>": If your product is **image** enter the address of the **registry** where your product is located, for example: registry.gitlab.com/whitespots-public/appsec-portal/back/auto\_validator:latest
40
+
11.\-F "domain=\<domain>": If your product is **web** enter the **domain name** of your product, for example: whitespots.io
41
+
12.\-F "host=\<host>": If your product is **web** enter the **IP address** of your product, for example: 0.0.0.0
It is a scalable solution that allows security teams to conduct efficient and comprehensive security assessments of their **web applications**.
12
+
13
+
BurpSuite Enterprise offers a wide range of automated scanning capabilities, including the ability to perform advanced scans on _complex_ web applications and identify vulnerabilities such as **SQL injection**, **cross-site scripting (XSS)**, and **authentication bypass**. The scanner also includes a variety of customization options, allowing users to configure the scanner according to their specific testing requirements.
In this command, the following parameters are used:
24
+
25
+
1.`-X POST`: specifies the HTTP method to be used (in this case, POST)
26
+
2.`-H "Authorization: Token <authorization_token>"`: specifies the [**authorization token**](../../importing-reports-from-scanners-to-appsec-portal/#authorization-token) obtained from AppSec Portal.
27
+
3.`-H "Content-Type: multipart/form-data"`: specifies the content type of the request.
28
+
4.`-F "file=@<report_file_path>"`: specifies the **path to the report file** generated by the scanner.
29
+
5.`-F "product_name=<product_name>"`: specifies the **name of the product** being scanned.
30
+
6.`-F "product_type=<product_type>"`: specifies the **type of the product** being scanned.
31
+
7.`-F "scanner_name=<scanner_name>"`: specifies the **name of the scanner** used to generate the report (Bandit Scan or GitLab Bandit)
32
+
8.`-F "branch=<branch_name>"`: (_optional_) specifies the name of the branch in the source code repository (if applicable) This parameter is particularly useful when you want to associate the scan results with a specific branch in your repository. If not provided, the scan will be associated with the default branch
Copy file name to clipboardexpand all lines: appsec-portal/scanners/scanner-description/web-scanners/owasp-zap.md
+21
Original file line number
Diff line number
Diff line change
@@ -4,4 +4,25 @@ description: This helps you discover vulnerabilities in web applications
4
4
5
5
# OWASP Zap
6
6
7
+
**AppSec Portal Importer Name**: GitLab OWASP Zap
8
+
7
9
[GitLab OWASP Zap](https://docs.gitlab.com/ee/user/application\_security/dast/proxy-based.html) is a penetration testing and vulnerability detection tool for **web applications**. It offers capabilities to scan web applications for vulnerabilities like **SQL injection**, **cross-site scripting (XSS)**, and more. OWASP Zap helps developers explore web application security and safeguard against known attacks.
In this command, the following parameters are used:
20
+
21
+
1.`-X POST`: specifies the HTTP method to be used (in this case, POST)
22
+
2.`-H "Authorization: Token <authorization_token>"`: specifies the [**authorization token**](../../importing-reports-from-scanners-to-appsec-portal/#authorization-token) obtained from AppSec Portal.
23
+
3.`-H "Content-Type: multipart/form-data"`: specifies the content type of the request.
24
+
4.`-F "file=@<report_file_path>"`: specifies the **path to the report file** generated by the scanner.
25
+
5.`-F "product_name=<product_name>"`: specifies the **name of the product** being scanned.
26
+
6.`-F "product_type=<product_type>"`: specifies the **type of the product** being scanned.
27
+
7.`-F "scanner_name=<scanner_name>"`: specifies the **name of the scanner** used to generate the report (GitLab OWASP Zap)
28
+
8.`-F "branch=<branch_name>"`: (_optional_) specifies the name of the branch in the source code repository (if applicable) This parameter is particularly useful when you want to associate the scan results with a specific branch in your repository. If not provided, the scan will be associated with the default branch
0 commit comments