An important difference between Wallarm and many other products, including the famous WAF, is its detection not only of hacker attacks, but also web application vulnerabilities. To make a truly quality vulnerability detector, we had to consider all the approaches that already exist — and develop our own.
An efficient vulnerability search is impossible without an understanding of how web applications are structured. However, many of today’s applications use an asynchronous work model with clients, web sockets, and other modern HTML5 technology — all this renders the old approaches to data collection (crawling) ineffective. To get the structure of the project, vulnerability scanner developers have to embed a full-fledged browser into them — but even in this case, collecting information about the application remains an extremely labor-intensive task, which increases the time needed for project verification. But Wallarm already has all network HTTP traffic at its disposal, so for us, crawling applications is nothing out of the ordinary. If users use web application, Wallarm understands how this application works.
The usual approach to security scanning looks more like a unit and functionality test. We wait for a response from the scanner about whether the check went through or not. All responses are processed manually. Developing Wallarm’s scanner, we tried to get approximate it as closely as possible to how a person works while auditing an application’s security. A person will study the application after receiving access — and we want the same thing from the Wallarm scanner. It breaks down conventional approaches to scanning, translating them into an offensive way. Wallarm can exploit vulnerabilities to expand the scope (of course, if Wallarm customer wants it). It is “fight hackers using their own methods” approach.
You can select the operating mode of the active scanner in the scanner’s settings:
Your board wants AI. Your developers are building with it. Your budget committee is asking…
AI systems are no longer just isolated models responding to human prompts. In modern production…
Broken authorization is one of the most widely known API vulnerabilities. It features in the…
The shadow technology problem is getting worse. Over the past few years, organizations have scaled…
API security has been a growing concern for years. However, while it was always seen…
It’s an unusually cold winter morning in Houston, and Craig Riddell is settling into his…