Security Scans Types

Security scans are ReadyAPI tools used to identify potential security vulnerabilities in your target services. Each scan sends a number of malicious requests to your service trying to provoke and identify some behavior that indicates a security vulnerability that needs to be handled.

In This Section

go.gifBoundary Scan

This scan tries to exploit bad handling of values that are outside of defined ranges.

go.gifCross Site Scripting Scan

This scan tries to find cross-site scripting vulnerabilities.

go.gifCustom Script Scan

This scan allows you to use a script for generating fuzzing values of custom parameters.

go.gifFuzzing Scan

This scan generates totally random input for the specified number of requests and their parameters.

go.gifHTTP Method Fuzzing Scan

pro.png This scan generates totally random input for the specified number of requests and their parameters.

go.gifInvalid Types Scan

This scan tries to exploit the handling of invalid input data.

go.gifInvalid JSON Types Scan

pro.png This scan tries to exploit the handling of JSON data.

go.gifJSON Fuzzing Scan

pro.png This scan generates random input and inserts it into a specified number of JSON POST requests.

go.gifJSON Boundary Scan

pro.png This scan tries to exploit bad handling of values outside of defined ranges in JSON POST requests.

go.gifMalformed XML Scan

This scan tries to exploit the bad handling of invalid XML on the server or service.

go.gifMalicious Attachment Scan

This scan tries to exploit the bad handling of attached files.

go.gifSensitive Files Exposure Scan

pro.png This scan tries to find files that contain sensitive information.

go.gifSQL Injection Scan

This scan tries to exploit bad database integration coding.

go.gifWeak Authentication Scan

pro.png This scan applies a static analysis of the request to authorization weaknesses.

go.gifXML Bomb Scan

This scan tries to exploit the bad handling of a malicious XML request.

go.gifXPath Injection Scan

This scan tries to exploit bad XML processing inside your target service.

Parameters

For most security scans, it is necessary for you to define specific values which should be tested. To define these values, use the Configuration inspector.

For more information on scan parameters, see Security Scan Parameters.

See Also

Publication date: