Web Server Scanners: Find Your Vulnerabilities Before Hackers Do

Web Server Scanners: Find Your Vulnerabilities Before Hackers Do

hen deploying a web server and web applications, you must defend against malicious attackers who can identify and exploit the vulnerabilities in these servers and apps. The nimda worm and its predecessors painfully reminded us of that. After all, robust firewall rules and strict router access control lists alone will not protect a web server, which is why web vulnerability scanners are useful tools.

Running a web vulnerability scanner against your web servers will:

  • Identify default files and directories that hackers could exploit
  • Detect inadequate patch levels
  • Point out poor passwords

In this article, I show how scanners achieve this level of defense and how you can utilize them to strengthen the build policy of your web servers. I also offer a review of some of the better known scanners that are currently available.

Anatomy of a Web Vulnerability Scanner
Most Web vulnerability scanners consist of an engine and a database. The database contains a list of directories, file names, CGI scripts, and URLs that have known security risks. Name-your-hat hackers cull Bugtraq postings, vendor advisories, application documentation, or personal favorites to create these lists. The final database usually contains the A, B, and C lists of well-known vulnerabilities, such as the IIS Unicode string exploit (/msadc/..%c0%af..%c0%af..), the Netscape PageServices bug (?wp-html-rend), and /wwwboard/passwd.txt (perhaps running on Apache).

The vulnerabilities can be server-specific like the PageServices bug, which displays a directory listing, or they can be OS-agnostic and target CGI scripts, such as WWWBoard or PHP-Nuke, which expose any server (even Apache) to attacks.

The scanner’s engine is merely a glorified method for making HTTP GET requests for each entry in the vulnerability database. A good engine, however, has some extra techniques for customizing requests. The homebrew crowd, for example, can put together a vulnerability scan using only the echo and nc (netcat) commands (e.g., echo -e “GET /wwwboard/passwd.txt HTTP/1.0

” | nc -vv 80).

Web Vulnerability Scanner in Your Build Policy
Web vulnerability scanners seem to be a favorite tool for malicious users, so why is including one when you deploy a web server so important? The scanner can address the security procedures of your web server build policy, in particular, the following:

  1. Testing input validation and removing unnecessary directories
  2. Removing unnecessary files and verifying the permissions on the files that rema
  3. in

  4. Ensuring strong, secure passwords

Test Input Validation and Remove Unnecessary Directories
Removing all unnecessary directories should be step one of the web server’s build policy. A scanner can assist with this procedure and, to some degree, test a web application’s resistance to input validation attacks. The IIS Unicode exploit is a good example of why this validation is important. A pre-emptive measure against this attack is to map the web document root to a different drive than the system volume (e.g., D:InetPub vs. C:WinntSystem32), which blocks command-line access via vulnerable directories such as /scripts/. Unfortunately, the /msadc/ is commonly mapped to C:Program FilesCommon FilessystemMSADC, which is on the same drive as the system root. So if the sole security measure is re-mapping the web document root, then the server still will be vulnerable because a (very likely) unused directory remains enabled. A good vulnerability scanner will search for the IIS Unicode exploit against default and common directories—of which there can be more than 20.

Remove Unnecessary Files and Verify Permissions
The second step of a web server’s build policy should be to remove unnecessary files and verify the permissions on the files that remain. The majority of checks that a vulnerability scanner conducts relate to sample files, default files, and incorrect file permissions. The default install of a Lotus Domino server, for example, places a slew of databases (.nsf files) within the web document root. Several of these files, especially the names.nsf file, contain sensitive information about the server that any anonymous Internet user may be able to read. You cannot blindly rely on Apache’s security either.

An improper install of the WWWBoard message board application leaves the password file readable to anyone who cares to look for it. Older versions of the Big Brother system-monitoring tool expose arbitrary files outside of the Web document root or they allow command execution. Even improper permissions for .htaccess files give up user passwords.

Ensure Strong Passwords
The hardest part of a build policy to implement (for anything other than HTTP Basic Authentication) is strong password creation. A good scanner will be able to perform rudimentary password guessing to ensure that no passwords can beeasily deciphered. For example, form-based authentication such as mail.yahoo.com or www.hotmail.com is more difficult—but not impossible—to attack.

The Scanner Review
Whisker
Whisker popularized web vulnerability scanning with its Perl implementation, which made extending the URL database easy. In fact, its most under-used capability is its ability to be run as a CGI script simply by placing it in the /cgi-bin/ on your web server. Whisker is best used as a URL scanner. It identifies web pages with known security problems or those pages that should be removed to make a clean web document root. It can also perform brute force attacks against sites using HTTP Basic Authentication.

The disadvantage of Whisker is that it has not been updated in a while, although the author is developing a major update that will add more checks and features. A current version of Whisker also has the capability to scan servers over SSL, but the scanner suffers the drawback of being primarily a URL checker. If it doesn’t find a page, it reports it to the user, but vulnerability checks for recent IIS bugs such as the Unicode or Double Decode directory traversal or Netscape’s PageServices bug are not in this version. They are not easy to implement using Whisker’s current engine, but the following modifications of the /scan.db file serve as a temporary fix:

scan () / > > /?PageServicesevalif( $D{'XXPageSrc'} =~ /index of/i) print "Vulnerable!
";else print "...false alarm ;(
";endeval

The next release, based on libWhisker, will address these bugs.

Stealth
Stealth scanner trades the portability of Whisker for a Windows-style GUI presentation. Stealth is more actively maintained than the 1.x series of Whisker and consequently has a larger database of vulnerabilities. It has Unicode and PageServices checks, but has a high ratio of false positives (reports of vulnerabilities that don’t exist). For example, it may return a false positive for the /?PageServices check if the server always returns a default page. All the scanners share this drawback due to the limited intelligence built into their engines.

Stealth is fast and comprehensive. The user can select a range of IP addresses to scan but cannot input a file list of IP addresses, which would be more helpful for administrators who wish to focus on a Web farm or specific servers.

Nessus
Nessus is a vulnerability checker that does not limit itself to web servers. It takes more effort to set up than Whisker or Stealth does, but it is actively maintained and has up-to-date vulnerability checks. It also returns false positives, however.

Twwwscan/Arirang
The twwwscan/arirang combination is another vulnerability scanner. Twwwscan is a binary program for Windows systems. Arirang is the Unix version, which shares the twwwscan engine. These tools allow the user to specify hosts, networks, and IP address ranges, and to easily customize the CGI checks (through /.uxe text files). Twwwscan checks specific and known server vulnerabilities; but it also has an extensive list of security checks for common misconfigurations that might apply to any homegrown web server. These tools are actively updated.

All of the tools I have discussed share two positive attributes. They have relatively comprehensive lists of vulnerable URLs and they can perform brute force password attacks against HTTP Basic Authentication or rudimentary Form-based authentication. The source code for Whisker, Nessus, and Arirang is available for users who wish to get under the hood and tinker with the engine. The major drawbacks of each engine are the level of false positives and the lack of application-specific checks. The false positives can be reduced with better intelligence when interpreting the results. Stealth and twwwscan run only on Windows platforms, the other tools run on Unix or Windows. BSD users will find that Whisker, Nessus, and Arirang are only a ports update away!

I’ve Scanned My Server. What’s Next?
Application-specific checks are a subset of vulnerability checking that cover input validation problems within the application. The next concern after removing unnecessary files is addressing possible vulnerabilities within the application. These could be attacks that inject SQL statements into data entry fields, embedded script attacks that launch social engineering attacks to collect passwords, or other input validation attacks that lead to arbitrary file retrieval or command execution.

The goal of an application-level scanner is to enumerate all user input fields. These fields can then be catalogued into potential vulnerabilities or functions. Potential vulnerabilities may range from database interaction to OS attacks, while the function of the field could range from login to database entry to search. Defining these categories and creating intelligence to check them is difficult. Whisker, Stealth, and Nessus do not even pretend to perform these types of checks. That’s where Sanctum’s Appscan application vulnerability assessment tool comes in. Its paradigm differs greatly from the file and URL checking of the other scanners, but its price, user interface, and configuration reflect this disparity in level of security.

Now, all you have to worry about is that your Web apps have been coded securely.

devx-admin

devx-admin

Share the Post:
Software Development

Top Software Development Companies

Looking for the best in software development? Our list of Top Software Development Companies is your gateway to finding the right tech partner. Dive in

India Web Development

Top Web Development Companies in India

In the digital race, the right web development partner is your winning edge. Dive into our curated list of top web development companies in India,

USA Web Development

Top Web Development Companies in USA

Looking for the best web development companies in the USA? We’ve got you covered! Check out our top 10 picks to find the right partner

Clean Energy Adoption

Inside Michigan’s Clean Energy Revolution

Democratic state legislators in Michigan continue to discuss and debate clean energy legislation in the hopes of establishing a comprehensive clean energy strategy for the

Chips Act Revolution

European Chips Act: What is it?

In response to the intensifying worldwide technology competition, Europe has unveiled the long-awaited European Chips Act. This daring legislative proposal aims to fortify Europe’s semiconductor

Revolutionized Low-Code

You Should Use Low-Code Platforms for Apps

As the demand for rapid software development increases, low-code platforms have emerged as a popular choice among developers for their ability to build applications with

Software Development

Top Software Development Companies

Looking for the best in software development? Our list of Top Software Development Companies is your gateway to finding the right tech partner. Dive in and explore the leaders in

India Web Development

Top Web Development Companies in India

In the digital race, the right web development partner is your winning edge. Dive into our curated list of top web development companies in India, and kickstart your journey to

USA Web Development

Top Web Development Companies in USA

Looking for the best web development companies in the USA? We’ve got you covered! Check out our top 10 picks to find the right partner for your online project. Your

Clean Energy Adoption

Inside Michigan’s Clean Energy Revolution

Democratic state legislators in Michigan continue to discuss and debate clean energy legislation in the hopes of establishing a comprehensive clean energy strategy for the state. A Senate committee meeting

Chips Act Revolution

European Chips Act: What is it?

In response to the intensifying worldwide technology competition, Europe has unveiled the long-awaited European Chips Act. This daring legislative proposal aims to fortify Europe’s semiconductor supply chain and enhance its

Revolutionized Low-Code

You Should Use Low-Code Platforms for Apps

As the demand for rapid software development increases, low-code platforms have emerged as a popular choice among developers for their ability to build applications with minimal coding. These platforms not

Cybersecurity Strategy

Five Powerful Strategies to Bolster Your Cybersecurity

In today’s increasingly digital landscape, businesses of all sizes must prioritize cyber security measures to defend against potential dangers. Cyber security professionals suggest five simple technological strategies to help companies

Global Layoffs

Tech Layoffs Are Getting Worse Globally

Since the start of 2023, the global technology sector has experienced a significant rise in layoffs, with over 236,000 workers being let go by 1,019 tech firms, as per data

Huawei Electric Dazzle

Huawei Dazzles with Electric Vehicles and Wireless Earbuds

During a prominent unveiling event, Huawei, the Chinese telecommunications powerhouse, kept quiet about its enigmatic new 5G phone and alleged cutting-edge chip development. Instead, Huawei astounded the audience by presenting

Cybersecurity Banking Revolution

Digital Banking Needs Cybersecurity

The banking, financial, and insurance (BFSI) sectors are pioneers in digital transformation, using web applications and application programming interfaces (APIs) to provide seamless services to customers around the world. Rising

FinTech Leadership

Terry Clune’s Fintech Empire

Over the past 30 years, Terry Clune has built a remarkable business empire, with CluneTech at the helm. The CEO and Founder has successfully created eight fintech firms, attracting renowned

The Role Of AI Within A Web Design Agency?

In the digital age, the role of Artificial Intelligence (AI) in web design is rapidly evolving, transitioning from a futuristic concept to practical tools used in design, coding, content writing

Generative AI Revolution

Is Generative AI the Next Internet?

The increasing demand for Generative AI models has led to a surge in its adoption across diverse sectors, with healthcare, automotive, and financial services being among the top beneficiaries. These

Microsoft Laptop

The New Surface Laptop Studio 2 Is Nuts

The Surface Laptop Studio 2 is a dynamic and robust all-in-one laptop designed for creators and professionals alike. It features a 14.4″ touchscreen and a cutting-edge design that is over

5G Innovations

GPU-Accelerated 5G in Japan

NTT DOCOMO, a global telecommunications giant, is set to break new ground in the industry as it prepares to launch a GPU-accelerated 5G network in Japan. This innovative approach will

AI Ethics

AI Journalism: Balancing Integrity and Innovation

An op-ed, produced using Microsoft’s Bing Chat AI software, recently appeared in the St. Louis Post-Dispatch, discussing the potential concerns surrounding the employment of artificial intelligence (AI) in journalism. These

Savings Extravaganza

Big Deal Days Extravaganza

The highly awaited Big Deal Days event for October 2023 is nearly here, scheduled for the 10th and 11th. Similar to the previous year, this autumn sale has already created

Cisco Splunk Deal

Cisco Splunk Deal Sparks Tech Acquisition Frenzy

Cisco’s recent massive purchase of Splunk, an AI-powered cybersecurity firm, for $28 billion signals a potential boost in tech deals after a year of subdued mergers and acquisitions in the

Iran Drone Expansion

Iran’s Jet-Propelled Drone Reshapes Power Balance

Iran has recently unveiled a jet-propelled variant of its Shahed series drone, marking a significant advancement in the nation’s drone technology. The new drone is poised to reshape the regional

Solar Geoengineering

Did the Overshoot Commission Shoot Down Geoengineering?

The Overshoot Commission has recently released a comprehensive report that discusses the controversial topic of Solar Geoengineering, also known as Solar Radiation Modification (SRM). The Commission’s primary objective is to

Remote Learning

Revolutionizing Remote Learning for Success

School districts are preparing to reveal a substantial technological upgrade designed to significantly improve remote learning experiences for both educators and students amid the ongoing pandemic. This major investment, which

Revolutionary SABERS Transforming

SABERS Batteries Transforming Industries

Scientists John Connell and Yi Lin from NASA’s Solid-state Architecture Batteries for Enhanced Rechargeability and Safety (SABERS) project are working on experimental solid-state battery packs that could dramatically change the

Build a Website

How Much Does It Cost to Build a Website?

Are you wondering how much it costs to build a website? The approximated cost is based on several factors, including which add-ons and platforms you choose. For example, a self-hosted

Battery Investments

Battery Startups Attract Billion-Dollar Investments

In recent times, battery startups have experienced a significant boost in investments, with three businesses obtaining over $1 billion in funding within the last month. French company Verkor amassed $2.1