Tools Guide
Chapter 7: Policy Manager
l
Query Injection: Web applications often use query strings as a simple method of passing data from
the client to the server. Query strings are a way to add data calls to a hyperlink, and then retrieve
that information on the linked page when it is displayed. By manipulating query strings, an attacker
can easily steal information from a database, learn details about the architecture of your web
application, or possibly execute commands on your web server.
When conducting an audit, Fortify WebInspect implements advanced query string manipulation to
ascertain the feasibility of command execution on your server(s), and determines the vulnerability
of your web applications to query string manipulation.
l
Query Sequence: Web applications often use query strings as a simple method of passing data
from the client to the server. Query strings are a way to add data calls to a hyperlink, and then
retrieve that information on the linked page when it is displayed. By manipulating query strings, an
attacker can easily steal information from a database, learn details about the architecture of your
web application, or possibly execute commands on your web server.
When conducting an audit, Fortify WebInspect implements advanced query string manipulation to
ascertain the feasibility of command execution on your server(s), and determines the vulnerability
of your web applications to query string manipulation by sending fragmented data to the target.
l
Reclassify: This engine analyzes the responses to generic/application non-specific attacks and
reclassifies certain vulnerability instances into specific known application vulnerabilities.
l
Request Modification: Several types of attacks involve malformed requests that result in a failed
response from the web server. The Request Modification engine generates requests that are
derived from other requests that match a pattern, and then evaluates the response to determine if
these types of attacks are possible.
l
Site Search: This can be considered the information gathering stage, much as an attacker would
learn as much as possible about your web application before launching an attack. Site search is
used to locate resources such as documents, applications and directories on the server that are not
intended to be viewed by web users. Disclosure of such resources can result in the disclosure of
confidential data, information about internal server and application configurations and settings,
administrative access to the site, and information about application source code.
l
SOAP Assessment: Web services are programs that communicate with other applications (rather
than with users) and answer requests for information. Most web services utilize SOAP (Simple
Object Access Protocol) to send XML data between the web service and the client web application
making the information request. SOAP assessment involves checking for security vulnerabilities
inherent within that transport mechanism.
l
SQL Injection: SQL Injection is an attack in which hackers use SQL statements via an Internet
browser to extract, add, or modify data, create a denial of service, bypass authentication, or
execute remote commands. The SQL Injection engine detects the following attacks:
l
Injection through user input, such as malicious strings in web forms
l
Injection through cookies, such as modified cookie fields that contain attack strings
l
Injection through server variables, such as headers that are manipulated to contain attack
strings
l
WAF Detection: This engine detects the presence of a web application firewall.
Micro Focus Fortify WebInspect (22.2.0)
Page 92 of 364