Team,

Just incase you are instructed to test the security of web without
using any active web scanners or the environment where you exist does
not allow to scan the web or etc reasons, you may find the passive
scanners very helpful in doing similar job. There are well known
passive scanners in which Ratproxy and Watcher are mostly used.

**** Ratproxy is a semi-automated, largely passive web application
security audit tool. It is meant to complement active crawlers and
manual proxies more commonly used for this task, and is optimized
specifically for an accurate and sensitive detection, and automatic
annotation, of potential problems and security-relevant design
patterns based on the observation of existing, user-initiated traffic
in complex web 2.0 environments.

There are numerous alternative proxy tools meant to aid security
auditors - most notably WebScarab, Paros, Burp, ProxMon, and Pantera.
Stick with whatever suits your needs, as long as you get the data you
need in the format you like.

That said, ratproxy is there for a reason. It is designed specifically
to deliver concise reports that focus on prioritized issues of clear
relevance to contemporary web 2.0 applications, and to do so in a
hands-off, repeatable manner. It should not overwhelm you with raw
HTTP traffic dumps, and it goes far beyond simply providing a
framework to tamper with the application by hand.

Ratproxy implements a number of fairly advanced and unique checks
based on our experience with these applications, as well as all the
related browser quirks and content handling oddities. It features a
sophisticated content-sniffing functionality capable of distinguishing
between stylesheets and Javascript code snippets, supports SSL
man-in-the-middle, on the fly Flash ActionScript decompilation, and
even offers an option to confirm high-likelihood flaw candidates with
very lightweight, a built-in active testing module.

The download link for Ratproxy:
http://ratproxy.googlecode.com/files/ratproxy-1.58.tar.gz

**** Watcher is a Fiddler addon which aims to assist penetration
testers in passively finding Web-application vulnerabilities. The
security field today has several good choices for HTTP proxies which
assist auditors and pen-testers. We chose to implement this as a
plugin for Fiddler which already provides the proxy framework for HTTP
debugging. Some reasons to use Watcher include:

Safe for the Cloud and hosting environments. Being passive gives
Watcher several advantages - when applications live in the Cloud
there's often a risk that running security testing could damage the
shared infrastructure. However, using a passive tool like Watcher
ensures that there's no chance of damaging Cloud-like infrastructure.

Safe for production environments. Watcher does not attack
web-applications with loads of intrusive requests, it doesn't modify
inputs to your application. Unlike crawlers and web-application
scanners, Watcher does not generate dangerous traffic. It quietly
analyzes normal user-interaction and makes educated reports on the
security of an application.

Low overhead, no training. If you’re building web-applications you
already have a development and test staff. Fiddler has been valuable
to dev and test for years as a general-purpose HTTP debugging proxy.
Watcher fits seamlessly into the picture, providing valuable security
insight with no special training requirements, dedicated machines, or
other resources.

The download link for Watcher:
http://websecuritytool.codeplex.com/releases/22212/download/62386

Hope this is very helpful!

Regards
Sandeep Thakur

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to