Rapid7 Insightappsec Appspider Attack Types Datasheet2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

DATA S H E E T

Attack Types in InsightAppSec


Rapid7’s research and product teams keep up with the latest application security attacks and best practices so you don’t have to.
With InsightAppSec, you can go way beyond the OWASP Top Ten to test for over 95 attack types and best practices; you can also
create custom checks to address issues and risks that are unique to your environment.

• Anonymous Access • Cross-Site Scripting • Information Disclosure in • Reverse Proxy


• Apache Struts 2
(XSS, DOM-Based Response
• Secure and Non-Secure
Framework Checks
Reflected via AJAX
Request) • Information Disclosure in Content Mix

• Apache Struts Detection • Cross-Site


Scripts (Script Check)
• Sensitive Data Exposure
• Arbitrary File Upload
Scripting
(XSS, DOM-Based) • Information
Response
Leakage In
• Sensitive Data Over an

• ASP.Net • Cross-Site Tracing (XST—


• Java Grinder
Insecure Channel
Misconfiguration Web Method) • Server Configuration
• ASP.NET Serialization • CSP Headers • JavaScript
Leaks
Memory
• Server Side Include (SSI)

• ASP.NET ViewState
• Custom Directory
• LDAP Injection
Injection
Security (ViewState Module • Server Side Template
Check)
• Custom Parameter • Local Storage Usage Injection

• Autocomplete Attribute/ Module • Nginx NULL Code • Session Fixation


Check
• Custom Passive Module • OS Commanding • Session Strength
• Blind SQL Injection • Directory Indexing • Out of Band Cross-Site • Session Upgrade
• Browser Cache Directive
• Email Disclosure
Scripting (XSS)
• Source Code Disclosure
(Leaking sensitive
information) • Expression Language • Out of Band Stored
Cross-Site Scripting • SQL Information Leakage

• Browser Injection (SQL Errors)


Cache Directive (XSS)
(Web application • File Inclusion • Parameter Fuzzing • SQL Injection
performance)
• Forced Browsing • Persistent • SQL injection Auth
• Brute Force (HTTP Auth) Cross-Site
• Form Session Strength
Bypass
Scripting (XSS, Passive–
• Brute Force Form-Based
• FrontPage Checks XSS Persistent) • SQL Parameter Check
Authentication
• Heartbleed Check • Persistent Cross-Site • SSL Strength
• Business Logic Abuse Scripting (XSS, Active—
• Subresource
• HTTP Integrity
• Clients Authentication XSS Persistent Active)
Cross-Domain Flaws
• PHP Code Execution
Over Insecure Channel
Policy Files
• HTTP Headers • Subdomain Discovery
• Collecting Sensitive • Predictable Resource
• Unvalidated Redirect
• HTTP Query Session
• URL Rewriting
Personal Information Location (Resource
(Personal sensitive Check Finder)
information)
• HTTP Response Splitting • Privacy Disclosure • Web Beacon
• Command Injection
• HTTP Strict Transport
• Privilege Escalation • Web Service Parameter

• Cookie Attributes Security (HSTS)


• Profanity
Fuzzing

• Credentials Over • HTTP User-Agent Check • Reflected • X-Content-Type-Options


• X-Frame-Options
Cross-
Insecure Channel
• HTTP Verb Tampering Site Scripting (XSS,
• Credentials Stored in (Request Method Reflected)
• XML External Entity

• Reflected
Clear Text in a Cookie Tampering) Attack
Cross-Site
(Password exposure).
• HTTPS Downgrade Scripting Simple (XSS,
• XPath Injection
• Cross Origin Resources
• HTTPS Everywhere Simple)
• X-Powered-By
Sharing (CORS)
• Information • Reflection • X-XSS-Protection
• Cross-Site
Disclosure in
Request
Forgery (CSRF)
Comments
• Reverse Clickjacking
Learn more at www.rapid7.com/insightappsec. 071919

You might also like