1. Database: SQL injection

Covering the scene:

Coverage type:

2. Database: slow query (moved to APM)

Explanation: When obtaining data in SQL, it is more difficult to obtain SQL statements at the same time. At present, this detection point has been abandoned. In addition, we cannot distinguish between network time and SQL execution time, and it is difficult to confirm whether slow queries are really slow queries. This feature was moved to APM module

Expect to cover the scene

3. Arbitrary file upload

Overlay scene

4. Download sensitive files, read arbitrary files

Overlay scene

5. File directory listing

Overlay scene

6. Scanner detection behavior 

Explanation: In most cases, the discovery of scanner behavior does not indicate a vulnerability. This feature is not in line with the original intention of RASP, so we turn off this feature by default., but you can configure to enable it

Overlay scene

7. CSRF

Description

IAST is able to detect CSRF. Even RASP can protect from CRSF, such vulnerabilities should be completed by the development framework. RASP can be implemented by inserting JS, that is, monitoring form creation in JS, inserting csrf token, and performing token verification on the server.

Overlay scene

8. Cookie tampering

Overlay scene

9. CRLF 

Explanation: Most of the HTTP header CRLF injection vulnerabilities have been fixed at the API level; however, it still exists in some non-HTTP protocols, such as the recently released Java/Scala/Kotlin/Clojure FTP protocol CRLF injection.

Overlay scene

10. XXE

Explanation: PHP cannot hook xml detection points, it is only supported in JAVA/Scala/Kotlin/Clojure, Node.js and .NET

Overlay scene

11. Deserialization Vulnerability

Overlay scene

12. Struts OGNL code execution

Overlay scene

13. WebShell behavior

Overlay scene

14. Remote command execution

Overlay scene

15. Command injection

Overlay scene

16. XSS: Reflected

Overlay scene

17. XSS: Stored

Overlay scene

18. LDAP injection [commercial version only]

Overlay scene

19. DOS: Regex Group Attack

Overlay scene

20. Printing sensitive log information

Overlay scene

21. File contains

Overlay scene

22. NTLM Information Disclosure Attack

Overwrite scene (Windows only)

23. SSRF

Overlay scene

24. Asset weakness identification

Overlay scene

25. Background Blasting Identification

Overlay scene

COPYRIGHT (C) 2014-2022 SECURITY REVIEWER SRL. ALL RIGHTS RESERVED.