FREE ACCESS & MORE: Syhunt takes action to help secure entities and businesses amid COVID-19 pandemic Read now

Technical Specifications

The information in this document applies to version 6.8.3 of Syhunt Hybrid Platinum.

This document presents the technical specifications of Syhunt Hybrid, an augmented HAST (Hybrid Application Security Testing), DAST (Dynamic Application Security Testing), SAST (Static Application Security Testing) and MAST (Mobile Application Security Testing) tool of high accuracy, depth and coverage that identifies vulnerabilities and weaknesses in applications.

a. License Rights

  • Syhunt Hybrid software licenses usually have a term of validity of 12 months.
  • The licenses include version update and technical support rights, in addition to providing technical documentation in English in PDF and HTML formats.
  • The licenses allow an unlimited number of scans against an unlimited number of Assets per year, which must be launched from a single or more Customer machines.

b. Architecture

Syhunt Hybrid is an application security assesment software tool, which is hybrid, on-premise, modular, asynchronous and multi-process:

  • It is hybrid, that is, it combines different analysis techniques, such as DAST, OAST, SAST, MAST and FAST (detailed below).
  • It is on-premise, that is, the solution is deployed on the Customer's premises, so that the analyzed source code and analysis results do not leave its internal network.
  • It is modular with a single management console that aggregates the configuration management features of its modules and analysis results presentation features.
  • It is asynchronous, that is, the solution works with several scans simultaneously, without the need of waiting for the end of each analysis.
  • It is multi-tabbed and multi-process, that is, each browser tab or scan is a different process in the operating system.
  • It comes with a command line interface (CLI) that allows the launching of dynamic and source code scans and other tasks.

Supported Types of Analysis

Syhunt Hybrid performs the following types of analysis:

SASTStatic analysis of the security of a web application's source code
MASTStatic analysis of the security of a mobile application's source code (Android & iOS) and Android APK file
DASTDynamic analysis of the security of a web application security with deep crawling and parameter injection
OASTAugmented dynamic analysis of the security of a web application security with out-of-band (OOB) techniques
HASTHybrid-Augmented analysis of the security of web applications, on which the results of the static analysis are automatically used to enhance its augmented dynamic analysis.
FASTForensic analysis of the security of a web application through the analysis of web server log files

Vulnerability Database

Syhunt currently comes with an internal vulnerability database that contemplates the sets of publicly available vulnerabilities and regulations listed in the table below. The tool's vulnerability database is updated periodically, ensuring that the solution is always up-to-date with new vulnerabilities published by international vulnerability databases.

CWE/SANS Top 25 2019Most Dangerous Software Errors: 2019 version or later
OWASP Top 10Top 10 Web Application Security Risks: 2017 version or later
OWASP Mobile Top 10Mobile Top 10 Risks: 2016 version or later (PLUS)
OWASP PHP Top 5
CWECommon Weakness Enumeration
CVECommon Vulnerabilities and Exposures
WASCThe Web Application Security Consortium Threat Classification
WAVSEPWeb Application Vulnerability Scanner Evaluation Project
NIST SAMATESoftware Assurance Metrics And Tool Evaluation Project
PCI DSSPayment Card Industry Data Security Standard: version 3.2, 3.2.1 or later

Integrations

Syhunt Hybrid comes with features for integration with the following systems:

Ticket ManagementJIRA
GitHub
Version ControlPublic and private GIT repositories
Azure Repos (using GIT)
GitHub
Branches
APIsLua 5,1 API
Web API (REST)
Application Vulnerability ManagementBIG-IP Application Security Manager (ASM)
Imperva SecureSphere
XML
Development Process ControlJenkins Pipeline (Windows)
Web BrowsersSyhunt Sandcat (Built-In)
Google Chrome
Mozilla Firefox
EmailSMTP

The examples below show how to perform the analysis of a GIT repository through the various available integration options:


-- from the command prompt
scancode git://sub.domain.com/repo.git
scancode https://github.com/user/repo.git -rb:master

-- from Jenkins pipeline script
syhunt.scanGIT([target: 'https://github.com/someuser/somerepo.git', branch: 'master', build: 'failifriskmedium'])

-- from Lua script
code:scanurl('https://github.com/someuser/somerepo.git', 'master')

-- from Web API (REST, raw JSON)
-- POST /syhunt/launch.lua
{
  sourcetarget: "https://github.com/someuser/somerepo.git",
  sourcebranch: "master",
  apikey: "YOUR_API_KEY"
}

Supported Languages & Environments

Syhunt Hybrid identifies vulnerabilities in applications with the following languages, environments and frameworks:

LanguageEnvironment / Framework
C#ASP.Net
JavaJEE
JSP
Android
Spring Framework
JavaScriptClient-Side
Server-Side
Node.js (Barebone, Express.js & Koa.js)
Angular (version 2 or higher)
AngularJS
JScript (ASP Classic)
ElectronJS (Desktop)
Luamod_lua
CGILua
Lua Pages
Objective-C, C & C++iOS
Perl
PHP
PythonCGI
mod_python
PSP
WSGI
Django
RubyRails
ERB
mod_ruby
SwiftiOS
TypeScriptAngular
VBVB.Net (ASP.Net)
VBScript (ASP Classic)

c. Source Code Analysis

Module NameSyhunt Code; Syhunt Mobile
DescriptionAnalyzes the source code of web and mobile applications for security vulnerabilities
Type of AnalysisSAST (Static Application Security Testing)
MAST (Mobile Application Security Testing)
Target ApplicationsWeb Applications (including Web Services)
Mobile Applications (Android & iOS)
Desktop Applications
Target Languages ​​& PlatformsAPK (Android)
ASP.Net & ASP Classic
HTML
Java (including Android)
JavaScript
Lua
Objective-C, C & C++ (iOS)
Perl
PHP
Python
Ruby
Swift (iOS)
TypeScript
Vulnerabilities Detected1300+
Vulnerability Categories Covered40+
GIT IntegrationYes
  • It comes with known application vulnerabilities in all programming languages and environments supported by the module.
  • Supports code embedded in HTML and print shorthands.
  • Identifies client-side and server-side vulnerabilities.
  • Identifies the use of outdated vulnerable scripts, local or remote, such as vulnerable versions of AngularJS, jQuery, fullPage, Bootstrap and momentjs.
  • Performs vulnerability analysis on complete source codes, code snippets and configuration files.
  • Supports multi-auditing of several programming languages ​​in the same scan session.
  • Identifies and allows to navigate through key areas of code, such as specific HTML markers, JavaScript, XHR requests, entry points and interesting keywords.
  • Identifies vulnerabilities in poorly designed code, that is, programming errors that expose the system to attack risks.
  • Analyzes configuration files to assess security threats and identify appropriate countermeasures at the stage of server, environment or application configuration.
  • Recognizes cases of input filtering and validation, providing accurate and false-positive free results.

Syhunt Code User Interface

The Syhunt Code's user interface allows real-time viewing of the status of running scans, including:

  1. Tree of analyzed and vulnerable files:
  2. Scan duration;
  3. Total scripts analyzed and vulnerable;
  4. Total vulnerabilities found and by severity level;
  5. Total lines analyzed;
  6. List of vulnerabilities found.

In addition, it identifies and displays points in the source code where it is possible with just one fix, to remediate vulnerabilities found in the application.

c2 Mobile Analysis

Syhunt Code performs MAST (Mobile Application Security Testing) in Android and iOS applications and Android APK files for pressing OWASP Mobile Top 10 and CWE/SANS Top 25 risks, such as:

Improper Platform Usage
Insecure Data Storage
Insecure Communication
Insecure Authentication
Insufficient Cryptography
Insecure Authorization
Client Code Quality
Code Tampering
Reverse Engineering
Extraneous Functionality

d. Dynamic Analysis

Module NameSyhunt Dynamic Augmented
DescriptionDetects security vulnerabilities in dynamic web applications and web servers
Type of AnalysisDAST (Dynamic Application Security Testing)
OAST (Out-of-Band Application Security Testing)
Target ApplicationsWeb Applications & Web Servers
Target Languages ​​& PlatformsASP.Net & ASP Classic
HTML & JavaScript
Java
Lua
Perl
PHP
Python
Ruby
Optimized Analysis for HTTP ServersApache
Apache Tomcat
Microsoft IIS
Nginx
Vulnerabilities Detected7000+
Vulnerability Categories Covered68+
Injection Checks570+
Supported ProtocolsHTTP version 1.0 & 1.1
HTTPS (SSL 2/SSL 3/TLS 1)
IPv6
Proxy (HTTP, Socks 4 & Socks 5)
Supported HTTP MethodsKeep-Alive
GZIP Compression
Authentication (Basic & Form-Based)
  • It comes with known web application vulnerabilities in the programming languages ​​and environments supported by the module.
  • Performs augmented dynamic analysis, a combination of DAST and OAST test methods.
  • Performs hybrid-augmented analysis, a combination of DAST, OAST and SAST test methods.
  • Identifies the use of outdated vulnerable scripts, server software and other components.
  • Identifies client-side and server-side vulnerabilities.
  • Identifies in-band, inferential and out-of-band (OOB) vulnerabilities.
  • Identifies known, vulnerable applications in all programming languages ​​supported by the solution, including ColdFusion, Flash & Server Side Includes (SSI).
  • Automatically performs structural, login form and HTTP authentication brute-force attacks.
  • It comes with invasive and non-invasive scanning capability.
  • Allows to turn off denial of service (DoS) tests that may affect the availability of the web application.
  • Allows to configure the number of retries and timeout used to connect to the web application.
  • Supports analysis of applications built on top of content management systems, such as Drupal, Joomla, WII and WordPress.
  • Supports analysis of SPAs (Single Page Applications).
  • Identifies the technologies used in the application and optimizes the scanning time based on the detected technologies.
  • Identifies the hidden versions of server software and components (Hunter-Sense™), such as Apache, Nginx, PHP, mod_ssl, OpenSSL and Phusion Passenger.
  • Performs data injection and manipulates parameters in the target application in URLs and forms (both GET and POST).
  • Performs injection mutations, in order to cover all programming languages ​​and target platforms supported by the solution.
  • Identifies vulnerabilities such as SQL injection,NoSQL injection, OS Command Injection, exposure and code injection through techniques such as inferential (response time), in-band (error message or print), out-of-band (OOB) and Passive Analysis.

Browsing and Crawling Capabilities

Syhunt Hybrid maps the structure, including all links and entry points of the target application, while emulating a modern browser with support for the following standards and features:

Latest Web StandardsHTML 5
CSS 3
Intelligent HTML AnalysisRelative Paths
Standard HTML
Non-standard or deformed HTML
Form Recognition
Browser EmulationGoogle Chrome
Mozilla Firefox
Microsoft Edge
Referer Submission
JavaScript SupportJavaScript analysis and execution
DOM Emulation
Browser Behavior
XHR Calls
Support for external JavaScript files
User Interaction SimulationKey press
Mouse clicks
Autofill forms
Automatic login
Cookies SupportCookie management
Session management
Follow RedirectsHTTP
Meta refresh
JavaScript
Process IsolationEach browser or scan tab is a different process in the system
Robots.txt File AnalysisIf the file is available

Syhunt intelligently handles large, complex websites with dynamic content generation and includes mechanisms to prevent loop situations during application mapping. In addition, it allows to limit the depth of scans, including:

  • Maximum number of links per server and links per page
  • Maximum URL size in bytes and HTTP response in kilobytes

Site Preferences

Syhunt Dynamic allows the creation of scan profiles for Assets, which specify:

  • Technologies used by the application in order to optimize the scanning time, such as the server-side language, the web server, the operating system and the database of the target application;
  • Start URLs;
  • SSL certificates and credentials for authentication allowing to perform the analysis logged in the target system (basic and web form-based);
  • Exclusion of objects from scanning, such as specific paths, forms and vulnerabilities;
  • Depth and layer limitation
  • Signatures for detecting custom 404 error pages;
  • Manual configuration of cookies and session token.

Syhunt Dynamic User Interface

The Syhunt Dynamic's user interface allows real-time viewing of the status of running scans, including:

  • Site tree of found and vulnerable paths;
  • Scan duration;
  • Total vulnerable URLs;
  • Total URLs using POST, authentication and JavaScript;
  • Total entry points;
  • Total timeouts;
  • Total vulnerabilities found and by severity level;
  • Total security checks performed;
  • Detected web technologies;
  • Target operating system type;
  • Target programming languages;
  • Depth Reached;
  • List of vulnerabilities found.

Built-In Web Browser

Syhunt Dynamic incorporates its own modern browser, known as Syhunt Sandcat, with vulnerability analysis extensions and features for manual testing and support for automated testing, such as:

  • Manual login to web applications
  • Capture URLs in manual navigation mode
  • Live HTTP headers
  • Preview capability for the most common web file formats, such as CSS, Flash, HTML, common image formats (bmp, gif, ico, jpg, png and svg), JavaScript, JSON, text and XML
  • Automatic JavaScript deobfuscation
  • Request replay capability
  • Fuzzer
  • Script executor
  • HTTP and XHR editors and request loader.

d2. Augmented Analysis

Module NameSyhunt Signal
DescriptionDetects out-of-band security vulnerabilities in dynamic web applications
Type of AnalysisOAST (Out-of-Band Application Security Testing)
Target ApplicationsWeb Applications

Syhunt Dynamic Augmented integrates with the online Syhunt Signal service to perform automated OAST (Out-of-Band Application Security Testing):

  • Allows the scanner to detect otherwise invisible, high-risk out-of-band (OOB) vulnerability variants
  • Listens to forced requests coming in from a vulnerable target web server over the course of a scan and signals back to the scanner.
  • Automatically correlates the received alerts with attack requests it launched.
  • Adds the identified OOB vulnerabilities to its report and user interface.
  • Returns zero false positives.
  • Automatically exfiltrates data from a vulnerable target, which gets added to the scan results, using different commands and techniques (environment and OS-specific).
  • Needs an active Internet connection to work.

The following out-of-band vulnerability types are detected by Syhunt Signal:

Command Execution
Remote File Inclusion (RFI)
Server-Side Request Forgery (SSRF)
SQL Injection
XML External Entity (XXE) Injection

d3. Hybrid-Augmented Analysis

Syhunt Hybrid combines the results of Syhunt Dynamic, Syhunt Signal and Syhunt Code to perform Hybrid-Augmented Analysis, AKA augmented HAST (Hybrid Application Security Testing), on which the results of the static analysis are automatically used to enhance its augmented dynamic analysis:

  • Combines SAST, DAST & OAST test methods.
  • Performs hybrid client-side JavaScript code analysis (SAST-in-DAST).
  • Dynamically detects and confirms vulnerabilities by simulating inferential, in-band and out-of-band (OOB) attacks and by using entry point and other information acquired through source code analysis.

d4. Forensic Log Analysis

Module NameSyhunt Dynamic Insight
DescriptionDetects security attacks in dynamic web applications
Type of AnalysisFAST (Forensic Application Security Testing)
Target ApplicationsWeb Applications

Syhunt Dynamic Insight performs on-demand security heuristic analysis of web server log files to detect attacks, including:

  • Identification of origin (IP address), country, type and methods used to attempt to compromise web applications;
  • Reconstruction of the attack session, accurately differentiating legitimate traffic from malicious traffic, in addition to differentiating automated attacks from manual attacks;
  • Intrusion detection, with backdoor installation, and used intrusion tools.
  • Detection of attempts to exploit OWASP Top 10 vulnerabilities and the use of defense evasion techniques.
  • Support for log files generated by Apache, Microsoft IIS and Nginx web servers, with automatic format detection.

e. Management Console

The management console aggregates the features for managing module settings and presenting the results of SAST, DAST and FAST scans:

  • Allows to access stored results of scans performed or in progress.
  • Does not require prior knowledge of information security and secure coding to use the console.
  • Requires little or no user intervention before and during the progress of scans.
  • Provides a graphical view that indicates the progress of the analysis and the risk level of the analysis being performed.
  • Displays software license information, showing the license type, license expiration date, and supported programming languages.
  • Allows the user to disable vulnerability detection rules and identify which rules have been disabled.
  • Allows the user to configure to ignore specific or multiple vulnerabilities.
  • Allows pause, resume and immediate scan cancellation.
  • Allows to identify, remove, export and import the results of scans performed.
  • Allows to add and manage assets.
  • Allows to export and import target lists from files in CSV or list format.
  • Allows to export and import the current tool settings to/from a file.
  • Allows real-time viewing of the list of vulnerabilities found.
  • Provides syntax highlighting for the programming languages ​​supported by the solution.
  • Includes its own notepad for manual testing, including a collection of common injection string generators, hash generators, encoders and decoders, HTML functions and text manipulation.
  • Includes an Extension Development Kit (EDK) to allow the addition of new features.

Scheduling Scans

The management console allows to schedule scans with the following fields and options:

  • Time, date or day of the week
  • Type of Scan: Dynamic or Code
  • Scan Target
  • Report generation with selection of report template
  • Sending a report by email after the analysis is finished
  • Option to perform a hidden scan (without window)
  • Option to export command line to be used in third party schedulers or other tools

Vulnerability Alerts

The management console allows editing and viewing a vulnerability alert, including changing the state, severity, and inserting comments on the vulnerabilities found.

Such alerts contain the following properties:

  • Vulnerability name
  • Vulnerability description;
  • Vulnerability location, which can be a URL or file.
  • Reference code for known vulnerability bases, such as CVE, CWE, NVD, OSVDB, if any;
  • CVSS score: version 2 and 3;
  • Severity level (High, Low, Medium or Informational);
  • Remediation guide;
  • The affected parameters;
  • Affected line numbers;
  • A short extract from the vulnerable source code, when applicable;
  • Remediation code examples, when applicable;
  • Request, Headers and HTTP Response, in case of dynamic analysis;
  • Exfiltrated data (if any);
  • User notes

f. Scan Features

Reporting and Results

Syhunt presents the scan results and generates reports on the vulnerabilities found:

  • Confirms whether an application's security breach has occurred from a trace.
  • Allows the comparison between two scans performed against the same target or source code, presenting the differences through a report and the management console that indicates the differences, such as new, unchanged or removed vulnerabilities.
  • Allows automatic sending of analysis results to a selected email address.
  • Generates alerts for each type of unique vulnerability that is identified.
  • Supports the CVSS (Common Vulnerability Scoring System) standard version 2.0 and 3.0, to communicate the severity of a vulnerability and help determine the urgency and priority of the security response, including base score and other metrics.
  • Generates reports in different formats, including the formats: PDF and HTML (for reading) and XML and CSV (to be processed by other tools).
  • Sorts vulnerabilities based on CVSS3, CVSS2 (ranging from 0.0 None to 10.0 Critical) or Four Severity Steps (high, low, medium or informational).

Report Templates

Syhunt offers the possibility of generating reports using the following templates:

StandardStandard management report
ComparisonIncluding the comparison of results of a scan with previous scans, indicating clearly the differences with evaluation graphs and tables
CompliancePass / fail report with items from OWASP Top 10, CWE / SANS Top 25 Most Dangerous Software Errors and PCI DSS in their most current versions
Compliance (Mobile)Pass / fail report with items from OWASP Mobile Top 10, CWE / SANS Top 25 Most Dangerous Software Errors and PCI DSS in their most current versions
CompleteIncluding comparison of results, compliance and all necessary technical and vulnerability information

The reports generated by the solution come with following information:

  • General scan details: start date, target, status, duration and scan method used;
  • Graphs and Statistics: consolidated total vulnerabilities and by severity level;
  • Vulnerability details: all details about each vulnerability alert, as displayed by the management console;
  • Coverage Details: mapped structure, list of forms, emails, JavaScript files and other resources found, as well as technologies and platforms detected during the analysis;
  • Version and brief description of the active license.

Vulnerability Scanning Methods

Syhunt comes with the following pre-defined scanning methods:

Application Scan (Dynamic)Maps the structure of a website and performs Passive Analysis and Active Attacks
Application Code ScanFocused on all types of vulnerabilities in source code
Spider OnlyOnly maps the structure of a website without performing Passive Analysis or attacks
Passive ScanOnly maps the structure of a website with Passive Analysis, but without attacks
Top 25 CWEBased on the CWE Top 25 Most Dangerous Software Errors list
Top 10 OWASPBased on the OWASP Top Ten Web Application Security Risks list
Top 5 PHPBased on OWASP PHP Top 5, but not just limited to PHP
Fault InjectionFocused on data injection flaws, such as XSS, SQL Injection, File Inclusion and Command Execution
Structure Brute-ForceFocused on finding common backup files, administrative pages and similar exposures
Backup FilesFocused on backup, hidden and obsolete files, but not as aggressively as the Structure Brute-Force method
Complete Penetration TestPerforms all dynamic tests in an extensive and time-consuming manner
SQL InjectionFocused on SQL Injection and NoSQL Injection vulnerabilities
XSSFocused on Cross-Site Scripting (XSS) vulnerabilities and evasion of anti-XSS filters
File InclusionFocused on local or remote file inclusion (LFI and RFI) vulnerabilities
Malicious ContentFocused on malware, backdoors, hidden entry points and signs of intrusion
Unvalidated RedirectsFocused on redirect vulnerabilities

SQL Injection Detection

Syhunt identifies SQL and NoSQL injection vulnerabilities through dynamic analysis, using inferential (time-based), in-band (error-based) and out-of-band (OOB) techniques, as well as through source code analysis. The following databases and techniques are covered:

DatabaseDAST (Inferential)DAST (In-Band)SASTOAST (OOB)
NoSQL InjectionN/A
MongoDBN/A
SQL Injection
Firebird/InterBaseN/AN/A
IBM DB2N/AN/A
InformixN/AN/A
MariaDB / MySQLN/A
Microsoft AccessN/AN/A
Microsoft SQL Server
Oracle
PostgreSQLN/A
SQLiteN/A
SybaseN/A

Detection of Code Injection and Code Disclosure

Syhunt identifies code injection and exposure vulnerabilities through dynamic analysis, using inferential (time-based) and in-band (print-based and Passive Analysis techniques), through source code analysis. The following languages, environments and techniques are covered:

Language or EnvironmentDAST (Inferential)DAST (Disclosure)DAST (In-Band)SAST (Injection Flaw)
ASP Classic
ASP.NET
Java
JavaScriptN/A
Lua (Nginx, Apache, CGI-Lua, and so on)
Perl
PHP
PythonN/A
RubyN/A
Server Side Includes (SSI)N/AN/AN/A

OS Command Injection Detection

Syhunt identifies OS command injection vulnerabilities through dynamic analysis, using inferential (time-based) and in-band (print-based) and out-of-band (OOB) techniques, as well as through source code analysis. The following OSes are covered:

OSDAST (Inferential)DAST (In-Band)SASTOAST (OOB)
Unix/Linux
Windows
BSD
Solaris
MacOS
iOSN/AN/AN/A
AndroidN/AN/AN/A

List of Vulnerability Checks

Syhunt identifies the following types of vulnerabilities, weaknesses and exposures in web applications, as well as in mobile applications when applicable:

API Abuse & Misuse
Arbitrary File Manipulation
Backdoor (Web-based)
Bad Practices
Broken Authentication
Broken Cryptography
Buffer Overflow
Code Injection, EL (Expression Language) Injection & Regular Expression Injection
Command Execution
Common Backup Files and Folders, and Backup with Common or Double Extension
Common Form Weaknesses, including email form hijacking, hidden price field, auto-complete enabled and unencrypted credit card transaction
Cookie Manipulation
Cross-Site Scripting (XSS), including DOM-based XSS, HTML5 specific, Weak XSS Filter and Cross Frame Scripting (XFS)
Dangerous Methods
Debug Entry Points, including Hidden Debug Parameters
Default Content
Denial-of-Service (DoS): Client and Server-Side
Directory Listing
Directory Traversal
Disclosure of Path, Source Code, Database, Password, Internal IP Address, Web Technology and others
Forgery of Log, Cross Site Request and Server Side Request (SSRF)
Hardcoding or Logging of Sensitive Information
HTTP header injection, HTTP response splitting
Inappropriate or Malicious Content
Inclusion of Local or Remote File
Information Leakage
Injection of LDAP
Injection of JSON, XML, XPath & XXE (XML External Entity)
Injection of NoSQL, SQL & HQL
Injection of SSI (Server-Side Includes)
Insecure Communication
Insecure Cryptographic and Hash Algorithms
Insecure Data Storage: missing or insufficient data protection cases
Insecure Randomness
Insecure Salting
Missing or Weak HTTP Security Headers
Security Misconfiguration
Sensitive Information on Client-Side
Suspicious Comments in Source Code and HTML
Uncontrolled Format String
Unencrypted Login
Unvalidated Redirects
Use of Local Storage, as well as confidential data stored in local storage
Weak Password Hashing
Weak Protocols

G. System Requirements

Syhunt Hybrid must be installed on the Microsoft Windows 7, 8 or 10 platform, but it is able to analyze applications designed for any target platform, including Android, Apple iOS and MacOS, BSD, Linux, Windows, Solaris and Unix.

  1. 4GB of available RAM (8GB recommended)
  2. 1GB of free disk space*
  3. Internet Connection (recommended for code scans and dynamic scans and some features)
  4. Windows 7, 8 or 10
  5. Internet Explorer 11 or higher
  6. GIT for Windows (optional for GIT repository scans)
  7. Java 8 or higher (optional for Android APK file scan)

* This does not include the space required to save scan session data, which varies depending on the website or source code being analyzed.

H. Glossary/References

  1. Active Attacks: when a security analysis carries out attacks such as brute force, injection and denial of services.
  2. Augmented Dynamic Analysis: the combination of the DAST and OAST test methods.
  3. Asset: a URL, source code file or repository that can be analyzed.
  4. DAST: Dynamic Application Security Testing is when a tool communicates with a web application to identify vulnerabilities and weaknesses in the application. Also known as a black-box test.
  5. DOM: Document Object Model.
  6. FAST: Forensic Application Security Testing.
  7. HAST: Hybrid Application Security Testing is the combination of the SAST and DAST test methods.
  8. Hybrid-Augmented Analysis: the combination of the SAST, DAST and OAST test methods.
  9. Injection: when the tool submits data to application's entry points and analyzes its response to determine if the application's code is vulnerable.
  10. Lua: lightweight and extensible scripting language created in Brazil, designed to expand applications.
  11. MAST: Mobile Application Security Testing is when a tool analyzes the source code or package of an application to identify programming errors and conditions that indicate vulnerabilities.
  12. NVD: National Vulnerability Database, the US government's vulnerability database.
  13. OOB: Out-of-Band.
  14. OAST: Out-of-band Application Security Testing is when a tool tries to force a web application to connect to other servers to identify otherwise invisible vulnerabilities in the application.
  15. OSVDB: Open Source Vulnerability Database.
  16. OWASP: Open Web Application Security Project.
  17. Passive Analysis: when a security analysis identifies vulnerabilities and exposures without executing attacks or drawing attention.
  18. PLUS: Indicates functionality available only in the Hybrid Platinum Plus license.
  19. Proof of Concept (PoC): Set of actions to demonstrate that a product will work as intended.
  20. Rule: An option that allows to enable or disable one or more vulnerability checks.
  21. SAST: Static Application Security Testing is when a tool analyzes the source code of an application to identify programming errors and conditions that indicate vulnerabilities. Also known as a white-box test.
  22. XHR: XMLHttpRequest is an API used to send HTTP or HTTPS requests from JavaScript.

For additional product documentation, visit syhunt.com/docs