Home Cyber Crime Raider: A tool to test authentication in web applications

Raider: A tool to test authentication in web applications


Open supply mission goals to supply ‘limitless flexibility’ for safety researchers

A new framework designed to test authentication protocols aims to plug the gaps left by popular vulnerability scanning tools

A brand new framework designed to check authentication protocols goals to plug the gaps left by fashionable vulnerability scanning instruments.

Raider is the brainchild of start-up DigeeX Security. It’s designed to check authentication mechanisms in internet functions.

Daniel Neagaru, who created the instrument, advised The Each day Swig: “The HTTP protocol is stateless, whereas the authentication itself is stateful. So to successfully run exams, Raider treats the method as a finite state machine.

“Every state accommodates the HTTP request, response, and inputs/outputs related to this info alternate.”

Read more about the latest web hacking tools

Written in Python, Raider retains monitor of the shopper’s state and offers an interface to work together with all-important parts throughout authentication, together with cookies, headers, and CSRF tokens.

Neagaru advised The Each day Swig that the configuration information are written in Hylang, a Lisp dialect on prime of Python, which presents “limitless flexibility”. Because of its structure, customers “can simply add new options with out messing with the primary code”, he mentioned.

Twin objective

Initially devised to “scratch his personal itches”, Neagaru mentioned Raider can be utilized by each safety researchers and organizations.

“Researchers might write attack situations and reuse them on different functions they’re testing,” he defined.

“Then again, organizations might arrange the configuration information, write a set of exams to run, and even combine them into their CI/CD pipeline to make sure that authentication works as anticipated and that no new bugs get launched.”

Hole available in the market

Raider was developed after Neagaru determined that different fashionable internet vulnerability testing instruments didn’t fairly produce the outcomes he wanted.

Neagaru advised The Each day Swig: “Like everybody else, when testing the authentication myself, I used to be utilizing basic internet proxies like ZAProxy and Burp Suite. Nonetheless, they don’t work properly for authentication.

RECOMMENDED Enfilade: Open source tool flags ransomware and bot infections in MongoDB instances

“For instance, if I wished to brute-force the multi-factor authentication code, however after every fallacious attempt, the applying requires repeating the login course of from the beginning, it will get difficult.

“I consider most authentication bugs within the wild have been found by writing customized Python scripts particular to the applying in query. With Raider, these sorts of assaults are straightforward to breed.

“Additionally, you possibly can reuse the working configuration information sooner or later to attempt some new assaults.”

Rising curiosity

Whereas Neagaru admits that there are limitations to utilizing the tool – specifically that the consumer must know each Python and Hylang – he mentioned there’s a “rising curiosity” from the safety neighborhood, based mostly on their metrics.

He added: “For the time being, Raider is within the technique of getting authorised by OWASP initiatives, so hopefully, quickly, it’ll get a brand new house there.

“The following step could be to construct a neighborhood round it in order that customers can be taught from one another and share their configurations.”

YOU MAY LIKE Top Hacks from Black Hat and DEF CON 2021

Source link