-
Notifications
You must be signed in to change notification settings - Fork 561
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dastardly scanner #896
Dastardly scanner #896
Conversation
Thanks; this looks like a well-crafted PR. I will start reviewing today. |
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## dev #896 +/- ##
======================================
+ Coverage 92% 92% +1%
======================================
Files 290 292 +2
Lines 18018 18134 +116
======================================
+ Hits 16559 16673 +114
- Misses 1459 1461 +2 ☔ View full report in Codecov by Sentry. |
5f040b4
to
6f6fd96
Compare
@domwhewell-sage excellent work on this PR. I made a few small updates:
Please let me know if you're opposed to any of these and feel free to make any updates. Then we can pass it off to @liquidsec for review. |
That all looks good to me @TheTechromancer |
Working on getting tests to pass. Running docker inside github action may be problematic. |
Hmm The only main difference now is |
Ahh you're right. Looks to be working now; that's a relief. |
As mentioned in #895 created a dastardly scanner module.
Dastardly is a lightweight web application security scanner, Originally designed for CI/CD pipelines but added as a module to bbot to allow for the detection of Reflected XSS, CORS, Vulnerable JS, Content type not specified, Multiple Content Types, HTML Charset and duplicate cookies. 7 common web application security issues.
The module is tagged as aggressive and the
--deadly
flag should be used to activate it.It will take
in_scope_only
andURL
events as input and start the dastardly docker container to crawl and audit the url. Dastardly crawling is limited to 10 minutes per url. But with many URLs and sub domains being discovered by other modules this should give a decent coverage of any web application.Currently the description of each finding/vulnerability would be "Cross-site scripting (reflected) found at https://ginandjuice.shop/catalog/subscribe" (Replace "Cross-site scripting (reflected)" with the finding name and "https://ginandjuice.shop/catalog/subscribe" with the exact URL) as the evidence provided by dastardly is too long to fit into the description which is included in the output.csv.
A test case has been added also to run the dastardly module against portswiggers deliberately vulnerable web app
https://ginandjuice.shop/
. (The test case also enables the module nmap to provide TCP_OPEN events and httpx to provide URL events)