Why N-Stalker

Top  Previous  Next

 

The release of N-Stalker Web Application Security Scanner X is an important step towards the next generation Web Application Security Assessment software, providing not only a tool to scan web resources, but a solution that will follow your web application development's life-cycle.

 

Component-oriented Web Application Security Analysis

 

The patent-pending technology of Component-oriented Web Application Security Analysis will provide the most effective approach to your custom application, enabling a Service-oriented Architecture (SOA) analysis with a security perspective.

 

N-Stalker Web Application Security Scanner will not only crawl resources as a browser would do it – it will also create a class of objects being used by your custom application to allow for a more effective assessment.

 

The concept of Development and QA, Infrastructure and Deploy and Penetration test analysis will give customers the ability to verify relevant security issues based in their web application life-cycle, from OWASP Top10 security recommendations to Bugtraq 0-day vulnerabilities being exploited by malicious users in the wild.

 

Web Application Secure Development Life-cycle

 

N-Stalker Web Application Security Suite is built to provide complete control over your Web Application Development Life-cycle. With a range of different security checks, customers will be able to create specific security scan policies to cover:

 

Development & QA Profile: a deep approach in the Web Application structure and output code (HTML), enabling N-Stalker to sweep out transaction brokers and common application areas to identify development security flaws. A QA approach can be used to certify internal or third-party development code and give the level of trust needed to promote web applications to production level.
Infrastructure & Deploy Profile: According to recent studies (Gartner Group), most of the vulnerabilities are introduced in the web application deployment phase, when even previously certified applications can become vulnerable due to third-parties vulnerable softwares. N-Stalker is the only vendor to provide more than 35,000 attack signatures to assess your Web server infrastructure and guarantee a safe hosting environment.
Pen-test and Security Audit Profile: A complete analysis of your web application, including development, infrastructure and production aspects that can be used to assess the current level of security of Web Applications currently in use.

 

Special Features

 

These are the special features that make N-Stalker Web Application Security Scanner the most complete solution to assess Web Applications:

 

HTTP Fingerprinting
Parallel Web Crawling
Server-side technology discoverer
Automatic False Positive Prevention Engine
Component-oriented Web Crawler
Component-oriented Scanning Engine
IDS Evasion Fuzzing Tests
Custom Web Navigation Macro Recorder
Web form autocomplete mechanism
Special Attack console to explore vulnerabilities
Effective Multithreading Scan for best performance
Compliance-oriented security analysis
Support to most common Web Assessment Standards such as OWASP Top10, PCI, SANS/FBI Top10/20
Support to Multiple authentication schemes, including Web Form, HTTP and x.509 authentication.
Most complete 39,000 Web Attack Signatures Database
Independent solution, no need for 3rd party database or software
Enhanced Report Generation for scanning comparison
Final Report supporting multiple formats (RTF,PDF)
Command-line scanner to automate your scanning experience
Integrated Google Hacking Database Search Tool
HTTP Web Authentication Brute Force
HTTP Performance Load Tester
HTTP Web Proxy with special interception interface