Análise empírica e comparativa de ferramentas de varredura de vulnerabilidades em aplicações Web usando OWASP BWA e Juice Shop
Resumo
Neste artigo, realizamos uma análise empírica e comparativa das ferramentas de varredura de vulnerabilidades GoLismero, Nikto, Nuclei, OpenVAS, SecretScanner, Wapiti e ZAP, utilizando como ambientes de teste as aplicações reconhecidas OWASP Broken Web Applications (BWA) e Juice Shop. Nosso objetivo foi avaliar a eficácia e a abrangência da cobertura de vulnerabilidades detectadas por cada ferramenta. Os resultados indicam que a combinação de múltiplas ferramentas é essencial para alcançar uma cobertura mais ampla e eficiente, proporcionando maior proteção contra vulnerabilidades e ameaças cibernéticas.
Palavras-chave:
Aplicação Web, Vulnerabilidades, Ferramentas de varredura, OWASP Top 10
Referências
Sampaio, F. F. Uma análise prática das principais vulnerabilidades em aplicações web baseado no top 10 OWASP, 2021.
Nagpure, S.; Kurkure, S. Vulnerability assessment and penetration testing of web application. In: IEEE. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). 2017. P. 1–6.
Appiah, V. et al. Survey of websites and web application security threats using vulnerability assessment. Journal of Computer Science, v. 15, n. 10, p. 1341–1354, 2018.
Ravindran, U.; Potukuchi, R. V. A Review on Web Application Vulnerability Assessment and Penetration Testing. Review of Computer Engineering Studies, v. 9, n. 1, 2022.
Curphey, M.; Arawo, R. Web application security assessment tools. IEEE Security & Privacy, v. 4, n. 4, p. 32–41, 2006. DOI: 10.1109/MSP.2006.108.
Khalid, M. N.; Rasheed, K.; Abid, M. M. et al.Web vulnerability finder (WVF): automated black-box web vulnerability scanner. Int J Inf Technol Comput Sci, v. 12, n. 4, p. 38–46, 2020.
Bertoglio, D. D. et al.Weasels e a construção de conhecimento em Segurança Ofensiva. In: SBC. ANAIS do II Simpósio Brasileiro de Educação em Computação. 2022. P. 109–117.
Holík, F.; Neradova, S. Vulnerabilities of modern web applications. In: IEEE. 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 2017. P. 1256–1261.
Althunayyan, M. et al. Evaluation of black-box web application security scanners in detecting injection vulnerabilities. Electronics, MDPI, v. 11, n. 13, p. 2049, 2022.
Alazmi, S.; De Leon, D. C. A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners. IEEE Access, IEEE, v. 10, p. 33200–33219, 2022.
Altulaihan, E. A.; Alismail, A.; Frikha, M. A survey on web application penetration testing. Electronics, MDPI, v. 12, n. 5, p. 1229, 2023.
Lakh, Y. et al. Investigation of the Broken Authentication Vulnerability in Web Applications. In: IEEE. 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). 2021. v. 2, p. 928–931.
Sinha, S. Bug Bounty Hunting for Web Security. Springer, 2019.
Pradhana, B. S. Website Security Analysis Using the OWASP10 Method (Case Study: almumtazparfumebatam. store). Jurnal Kewarganegaraan, v. 8, n. 1, p. 588–605, 2024.
Kritikos, K. et al. A survey on vulnerability assessment tools and databases for cloud-based web applications. Array, Elsevier, v. 3, p. 100011, 2019.
Nirmal, K.; Janet, B.; Kumar, R. Web application vulnerabilities-the hacker’s treasure. In: IEEE. 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). 2018. P. 58–62.
Amaral, É. et al. Unihacker: fundamentos da segurança I, 2021.
Alencar, I. D. d. et al. AuDiNoMiC: um gerenciador autonômico para auditorias em segurança ofensiva. Universidade Federal de Alagoas, 2019.
OWASP. Vulnerability Scanning Tools. 2024. [link].
OWASP. OWASP Top Ten. 2024. [link].
Lazarov, W. et al. Penterep: Comprehensive Penetration Testing with Interactive Checklists. Available at SSRN 4743158.
Nagpure, S.; Kurkure, S. Vulnerability assessment and penetration testing of web application. In: IEEE. 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). 2017. P. 1–6.
Appiah, V. et al. Survey of websites and web application security threats using vulnerability assessment. Journal of Computer Science, v. 15, n. 10, p. 1341–1354, 2018.
Ravindran, U.; Potukuchi, R. V. A Review on Web Application Vulnerability Assessment and Penetration Testing. Review of Computer Engineering Studies, v. 9, n. 1, 2022.
Curphey, M.; Arawo, R. Web application security assessment tools. IEEE Security & Privacy, v. 4, n. 4, p. 32–41, 2006. DOI: 10.1109/MSP.2006.108.
Khalid, M. N.; Rasheed, K.; Abid, M. M. et al.Web vulnerability finder (WVF): automated black-box web vulnerability scanner. Int J Inf Technol Comput Sci, v. 12, n. 4, p. 38–46, 2020.
Bertoglio, D. D. et al.Weasels e a construção de conhecimento em Segurança Ofensiva. In: SBC. ANAIS do II Simpósio Brasileiro de Educação em Computação. 2022. P. 109–117.
Holík, F.; Neradova, S. Vulnerabilities of modern web applications. In: IEEE. 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). 2017. P. 1256–1261.
Althunayyan, M. et al. Evaluation of black-box web application security scanners in detecting injection vulnerabilities. Electronics, MDPI, v. 11, n. 13, p. 2049, 2022.
Alazmi, S.; De Leon, D. C. A systematic literature review on the characteristics and effectiveness of web application vulnerability scanners. IEEE Access, IEEE, v. 10, p. 33200–33219, 2022.
Altulaihan, E. A.; Alismail, A.; Frikha, M. A survey on web application penetration testing. Electronics, MDPI, v. 12, n. 5, p. 1229, 2023.
Lakh, Y. et al. Investigation of the Broken Authentication Vulnerability in Web Applications. In: IEEE. 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS). 2021. v. 2, p. 928–931.
Sinha, S. Bug Bounty Hunting for Web Security. Springer, 2019.
Pradhana, B. S. Website Security Analysis Using the OWASP10 Method (Case Study: almumtazparfumebatam. store). Jurnal Kewarganegaraan, v. 8, n. 1, p. 588–605, 2024.
Kritikos, K. et al. A survey on vulnerability assessment tools and databases for cloud-based web applications. Array, Elsevier, v. 3, p. 100011, 2019.
Nirmal, K.; Janet, B.; Kumar, R. Web application vulnerabilities-the hacker’s treasure. In: IEEE. 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). 2018. P. 58–62.
Amaral, É. et al. Unihacker: fundamentos da segurança I, 2021.
Alencar, I. D. d. et al. AuDiNoMiC: um gerenciador autonômico para auditorias em segurança ofensiva. Universidade Federal de Alagoas, 2019.
OWASP. Vulnerability Scanning Tools. 2024. [link].
OWASP. OWASP Top Ten. 2024. [link].
Lazarov, W. et al. Penterep: Comprehensive Penetration Testing with Interactive Checklists. Available at SSRN 4743158.
Publicado
27/11/2024
Como Citar
ROSA, Ricardo; KREUTZ, Diego; GARCIA, Marcelino; PEREIRA, Santiago; MANSILHA, Rodrigo.
Análise empírica e comparativa de ferramentas de varredura de vulnerabilidades em aplicações Web usando OWASP BWA e Juice Shop. In: ESCOLA REGIONAL DE REDES DE COMPUTADORES (ERRC), 21. , 2024, Rio Grande/RS.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2024
.
p. 183-188.
DOI: https://doi.org/10.5753/errc.2024.4689.