Use the URLs collected |
Top Previous Next |
The manual test is initiated by means of navigation through the application’s URLs with the Browser activated by N-Stalker’s internal Proxy which captures all requisitions and responses from the application (as in the configuration for recording of a navigation macro). Once the URLs you wish to analyze are captured, we can inform on how to use them for analysis, selecting and redirecting the attack mode.
The “Website Tree” control allows user to visualize all the resources that were gathered during the trip of the N-Stalker spider/proxy engine, including web pages and transactions. The “Website Tree” is co-ordinated by web servers (URLs) which represent all the various hosts located on the crawler path (please remember that only the URL itself and the allowed hosts can be crawled through).
Authorizing a rejected host
Sometimes the applications may refer to external web sites which are not relevant for the verification of global security, however, there are some situations where external web sites are part of the inspected application and thus must be assessed.
In the "Scanner Events" tree, on the "Rejected Hosts" option, it is possible to see a list of web sites that had been rejected by the N-Stalker spider engine due to configuration restrictions.
7. In case you need to explicitly authorize a host from the list, please right click on it, then click on "Enable Host" and confirm by clicking on the "Yes" button.
8. After navigating throughout your application and having accomplished the desired configurations, click on the "Start Scan" button to initiate the scanning engine.
Then a screen with 3 options related to the data stored by the proxy is displayed. Please select the option of your choice in case you wish to initiate Scan only with data stored by the proxy. Use the proxy data to track new URLs or to track all the URLs again including data stored by the proxy.
Details:
If you select this option the Scanner will be executed only in the URLs stored by the proxy.
If you select this option the Scanner will be executed in the URLs stored by the proxy but will also search for new URLs to be analyzed.
If you select this option the Spider will track all URLs again, including the URLs stored beforehand by the proxy.
On the right corner of the screen, the quantity of URLs captured by the proxy at the time of navigation is then informed. Please select your option and click on the "Done" button to initiate execution of tests.
The "Scanning Session Interface" is open for execution of tests.
On the "Scan Modules" guide, on the footer of the N-Stalker scanning interface, there is a series of guides containing technical information about the scanning progress status including event items, components and depuration.
Before starting the manual test wait until the status shifts to the "Standby Mode - You may now run manual attacks or press "Close" to finish session" on the footer of the application.
|