Jump to content
Nytro

PHP Vulnerability Hunter Overview

Recommended Posts

PHP Vulnerability Hunter Overview

 

 

PHP Vulnerability Hunter is an advanced whitebox PHP web application fuzzer that scans for several different classes of vulnerabilities via static and dynamic analysis. By instrumenting application code, PHP Vulnerability Hunter is able to achieve greater code coverage and uncover more bugs.

Key Features

Automated Input Mapping

While most web application fuzzers rely on the user to specify application inputs, PHP vulnerability hunter uses a combination of static and dynamic analysis to automatically map the target application. Because it works by instrumenting application, PHP Vulnerability Hunter can detected inputs that are not referenced in the forms of the rendered page.

Several Scan Modes

PHP Vulnerability Hunter is aware of many different types of vulnerabilities found in PHP applications, from the most common such as cross-site scripting and local file inclusion to the lesser known, such as user controlled function invocation and class instantiation. 

PHP Vulnerability Hunter can detect the following classes of vulnerabilities:
  • Arbitrary command execution
  • Arbitrary file read/write/change/rename/delete
  • Local file inclusion
  • Arbitrary PHP execution
  • SQL injection
  • User controlled function invocatino
  • User controlled class instantiation
  • Reflected cross-site scripting (XSS)
  • Open redirect
  • Full path disclosure

Code Coverage

Get measurements of how much code was executed during a scan, broken down by scan plugin and page. Code coverage can be calculated at either the function level or the code block level.

Scan Phases

  1. Initialization Phase
    During this phase, interesting function calls within each code file are hooked, and if code coverage is enabled the code is annotated. Static analysis is performed on the code to detect inputs.
  2. Scan Phase
    This is where the bugs are uncovered. PHP Vulnerability Hunter iterates through its different scan plugins and plugin modes, scanning every file within the targeted application. Each time a page is requested, dynamic analysis is performed to discover new inputs and bugs.
  3. Uninitialization
    Once the scan phase is complete, all of the application files are restored from backups made during the initialization phase.

 

Link: https://www.autosectools.com/PHP-Vulnerability-Scanner

  • Upvote 1
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...