On Fri, Mar 26, 2004 at 01:48:02PM -0500, John Lampe wrote:
> On Fri, 26 Mar 2004, Flickema, Drew W. wrote:
> 
> >   I have a pilot program in place using SPI Dynamics WebInspect (WI)
> > product to scan my environment for possible SQL Injection in web
> > applications.  I have ran across the following paper;
> > http://www.tenablesecurity.com/white_papers/sec_test_light_newt_nessus1.
> > pdf , which suggests Nessus may be able to detect SQL and XSS
> > vulnerabilities.  The paper is dated Jan 2, 2004, so it is relatively
> > new.  I followed the suggestions of this paper to run a head to head
> > test against WI.  There exists a website to test against,
> > http://endo.webappsecurity.com .  I discovered that WI found 2 SQL
> > Injection vulnerabilities whereas Nessus found none.  Nessus did
> > discover the CVS directory and expanded the root tree.
> >   One thing I thought might be happening is that the website to test
> > against is owned by SPI and they have programmed in to watch for Nessus
> > scans to force false negatives.
> >   Is there anyone successfully using sql_injection.nasl and
> > tourturecgis.nasl to discover SQL or XSS vulnerabilities?  I would be
> > interested in either an offline or online discussion.
> 
> Yeah, I used it a lot :-)  You'll need to give webmirror.nasl and
> sql_injection.nasl some time to finish....i.e. these aren't 10 second
> tests.  I'm very curious of the two SQL Injection bugs that existed but
> were not found by Nessus....

sql_injection.nasl and torture_cgi.nasl could be much more effective if
they used a POST request vs. the current GET requests. However I fear
that it will trash many more websites. Only use POST when safe_checks()
is disabled maybe ?


                                -- Renaud


_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to