{"id":387,"date":"2014-07-04T15:52:21","date_gmt":"2014-07-04T07:52:21","guid":{"rendered":"http:\/\/ixyzero.com\/blog\/?p=387"},"modified":"2014-07-04T15:52:21","modified_gmt":"2014-07-04T07:52:21","slug":"%e8%8e%b7%e5%8f%96wvs%e5%8f%af%e4%bb%a5%e6%a3%80%e6%b5%8b%e7%9a%84%e6%bc%8f%e6%b4%9e%e5%88%97%e8%a1%a8","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/387.html","title":{"rendered":"\u83b7\u53d6WVS\u53ef\u4ee5\u68c0\u6d4b\u7684\u6f0f\u6d1e\u5217\u8868"},"content":{"rendered":"<p>\u4e4b\u524d\u5728\u4f7f\u7528WVS\u7684\u65f6\u5019\u53ea\u662f\u7b80\u5355\u7684\u4f7f\u7528\uff0c\u4f46\u662f\u540e\u6765\u60f3\u77e5\u9053WVS\u5230\u5e95\u80fd\u626b\u63cf\u51fa\u90a3\u4e9b\u6f0f\u6d1e\uff0c\u5373\u5b83\u7684\u626b\u63cf\u529f\u80fd\u548c\u79cd\u7c7b\u6709\u54ea\u4e9b\uff0c\u4e00\u76f4\u4e5f\u4e0d\u77e5\u9053\u8be5\u600e\u4e48\u83b7\u53d6\uff0c\u540e\u6765\u5728\u8bbf\u95ee\u5176\u5b98\u7f51\u65f6\u627e\u5230\u4e86\u8fd9\u6837\u7684\u4e00\u4e2a\u5217\u8868\uff0c\u5f53\u65f6\u5c31\u501f\u9274\u522b\u4eba\u7684\u6293\u53d6\u811a\u672c\u81ea\u5df1\u4e5f\u5199\u4e86\u4e2a\u811a\u672c\u8fdb\u884c\u6293\u53d6\uff08\u4f46\u662f\u73b0\u5728\u56de\u60f3\u8d77\u6765\uff0c\u5176\u5b9e\u6700\u597d\u7684\u65b9\u6cd5\u8fd8\u662f\u7528shell\u8c03\u7528curl\/sed\/awk\/grep\u7b49\u5de5\u5177\u6293\u53d6\u9875\u9762\u7136\u540e\u5408\u5e76\u6210HTML\u6587\u4ef6\uff0c\u89c2\u770b\u8d77\u6765\u6548\u679c\u66f4\u597d\uff09\uff0c\u4e0b\u9762\u5c31\u628a\u4e4b\u524d\u7684\u4e00\u4e2a\u8fc7\u7a0b\u7a0d\u5fae\u63cf\u8ff0\u4e00\u4e0b\uff1a<\/p>\n<div>\n<h1 class=\"entry-title\" style=\"color: #1b2426;\">Which Vulnerabilities does Acunetix Web Vulnerability Scanner Check for?<\/h1>\n<\/div>\n<div>\n<p style=\"color: #1b2426 !important;\">Acunetix Web Vulnerability Scanner automatically checks for the following vulnerabilities, among\u00a0<a style=\"color: #e00a14;\" title=\"Full list of vulnerabilities identified by Acunetix WVS\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/\">others<\/a>{ <a href=\"http:\/\/www.acunetix.com\/vulnerabilities\/\" target=\"_blank\">http:\/\/www.acunetix.com\/vulnerabilities\/<\/a>\u00a0}:<\/p>\n<h2>Web Server Configuration Checks{<span style=\"color: #ff0000;\">Web\u670d\u52a1\u5668\u914d\u7f6e\u68c0\u6d4b<\/span>}<\/h2>\n<ul style=\"color: #666666;\">\n<li style=\"color: #1b2426 !important;\">Checks for Web Servers Problems \u2013 Determines if dangerous HTTP methods are enabled on the web server (e.g. PUT, TRACE, DELETE)<\/li>\n<li style=\"color: #1b2426 !important;\">Verify Web Server Technologies<\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Web Server Security\" href=\"http:\/\/www.acunetix.com\/websitesecurity\/webserver-security\/\">Vulnerable Web Servers<\/a><\/li>\n<li style=\"color: #1b2426 !important;\">Vulnerable Web Server Technologies \u2013 such as \u201cPHP 4.3.0 file disclosure and possible code execution.<\/li>\n<\/ul>\n<h2>Parameter Manipulation\u00a0Checks{<span style=\"color: #ff0000;\">\u53c2\u6570\u64cd\u7eb5\u68c0\u6d4b<\/span>}<\/h2>\n<ul style=\"color: #666666;\">\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Cross Site Scripting\" href=\"http:\/\/www.acunetix.com\/websitesecurity\/cross-site-scripting\">Cross-Site Scripting (XSS)<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Possible CSRF (Cross-site request forgery)\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/possible-csrf-cross-site\/\">Cross-Site Request Forgery (CSRF)<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"SQL Injection\" href=\"http:\/\/www.acunetix.com\/websitesecurity\/sql-injection\">SQL Injection<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Code execution\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/code-execution\/\">Code Execution<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Directory Traversal\" href=\"http:\/\/www.acunetix.com\/websitesecurity\/directory-traversal\">Directory Traversal<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"HTTP Parameter Pollution White Paper\" href=\"http:\/\/www.acunetix.com\/blog\/whitepaper-http-parameter-pollution\/\">HTTP Parameter Pollution<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"File inclusion\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/file-inclusion\/\">File Inclusion<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Script source code disclosure\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/script-source-code-disclo\/\">Script Source Code Disclosure<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"CRLF Injection\" href=\"http:\/\/www.acunetix.com\/websitesecurity\/crlf-injection\">CRLF Injection<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Cross Frame Scripting\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/cross-frame-scripting\/\">Cross Frame Scripting (XFS)<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"PHP code injection\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/php-code-injection\/\">PHP Code Injection<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"XPath Injection vulnerability\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/xpath-injection-vulnerabi\/\">XPath Injection<\/a><\/li>\n<li style=\"color: #1b2426 !important;\">Path Disclosure<br \/>\n(<a style=\"color: #e00a14;\" title=\"Possible server path disclosure (Unix)\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/possible-server-path-disc-2\/\">Unix\u00a0<\/a>and\u00a0<a style=\"color: #e00a14;\" title=\"Possible server path disclosure (Windows)\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/possible-server-path-disc\/\">Windows<\/a>)<\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"LDAP Injection\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/ldap-injection\/\">LDAP Injection<\/a><\/li>\n<li style=\"color: #1b2426 !important;\">Cookie Manipulation<\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Arbitrary file creation\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/arbitrary-file-creation\/\">Arbitrary File creation<\/a>\u00a0(AcuSensor Technology)<\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Arbitrary file deletion\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/arbitrary-file-deletion\/\">Arbitrary File deletion<\/a>\u00a0(AcuSensor Technology)<\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"Email Injection\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/email-injection\/\">Email Injection<\/a>\u00a0(AcuSensor Technology)<\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"File tampering\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/file-tampering\/\">File Tampering<\/a>\u00a0(AcuSensor Technology)<\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" title=\"URL redirection\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/url-redirection\/\">URL redirection<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" href=\"http:\/\/www.acunetix.com\/blog\/web-security-zone\/articles\/the-hidden-dangers-of-xsltprocessor-remote-xsl-injection\/\">Remote XSL inclusion<\/a><\/li>\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" href=\"http:\/\/www.acunetix.com\/blog\/web-security-zone\/articles\/dom-xss\/\">DOM XSS<br \/>\n<\/a><\/li>\n<li style=\"color: #1b2426 !important;\">MultiRequest Parameter Manipulation<\/li>\n<li style=\"color: #1b2426 !important;\">Blind SQL\/XPath Injection<\/li>\n<li style=\"color: #1b2426 !important;\">Input Validation<\/li>\n<li style=\"color: #1b2426 !important;\">Buffer Overflows<\/li>\n<li style=\"color: #1b2426 !important;\">Sub-Domain Scanning<\/li>\n<\/ul>\n<h2>File Checks{<span style=\"color: #ff0000;\">\u6587\u4ef6\u3001\u811a\u672c\u68c0\u6d4b<\/span>}<\/h2>\n<ul style=\"color: #666666;\">\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" href=\"http:\/\/www.acunetix.com\/vulnerabilities\/backup-files\/\">Checks for Backup Files or Directories &#8211; Looks for common files (such as logs, application traces, CVS web repositories)<\/a><\/li>\n<li style=\"color: #1b2426 !important;\">Cross Site Scripting in URI<\/li>\n<li style=\"color: #1b2426 !important;\">Checks for Script Errors<\/li>\n<\/ul>\n<h2>File Uploads{<span style=\"color: #ff0000;\">\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\u68c0\u6d4b<\/span>}<\/h2>\n<ul style=\"color: #666666;\">\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" href=\"http:\/\/www.acunetix.com\/websitesecurity\/upload-forms-threat\/\">Unrestricted File uploads Checks<\/a><\/li>\n<\/ul>\n<h2>Directory Checks{<span style=\"color: #ff0000;\">\u76ee\u5f55\u904d\u5386\u76f8\u5173\u6f0f\u6d1e\u68c0\u6d4b<\/span>}<\/h2>\n<ul style=\"color: #666666;\">\n<li style=\"color: #1b2426 !important;\">Looks for Common Files (such as logs, traces, CVS)<\/li>\n<li style=\"color: #1b2426 !important;\">Discover Sensitive Files\/Directories<\/li>\n<li style=\"color: #1b2426 !important;\">Discovers Directories with Weak Permissions<\/li>\n<li style=\"color: #1b2426 !important;\">Cross Site Scripting in Path and PHPSESSID Session Fixation.<\/li>\n<li style=\"color: #1b2426 !important;\">Web Applications<\/li>\n<li style=\"color: #1b2426 !important;\">HTTP Verb Tampering<\/li>\n<\/ul>\n<h2>Text Search{<span style=\"color: #ff0000;\">\u6587\u672c\u4fe1\u606f\u68c0\u6d4b<\/span>}<\/h2>\n<ul style=\"color: #666666;\">\n<li style=\"color: #1b2426 !important;\">Directory Listings<\/li>\n<li style=\"color: #1b2426 !important;\">Source Code Disclosure<\/li>\n<li style=\"color: #1b2426 !important;\">Check for Common Files<\/li>\n<li style=\"color: #1b2426 !important;\">Check for Email Addresses<\/li>\n<li style=\"color: #1b2426 !important;\">Microsoft Office Possible Sensitive Information<\/li>\n<li style=\"color: #1b2426 !important;\">Local Path Disclosure<\/li>\n<li style=\"color: #1b2426 !important;\">Error Messages<\/li>\n<li style=\"color: #1b2426 !important;\">Trojan Shell Scripts (such as popular PHP shell scripts like r57shell, c99shell etc)<\/li>\n<\/ul>\n<h2>Weak Password Checks{<span style=\"color: #ff0000;\">\u5f31\u5bc6\u7801\u68c0\u6d4b&#8211;\u66b4\u529b\u7834\u89e3<\/span>}<\/h2>\n<ul style=\"color: #666666;\">\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" href=\"http:\/\/www.acunetix.com\/websitesecurity\/authentication.htm\">Weak HTTP Passwords<\/a><\/li>\n<li style=\"color: #1b2426 !important;\">Authentication attacks<\/li>\n<li style=\"color: #1b2426 !important;\">Weak FTP passwords<\/li>\n<\/ul>\n<h2>Google Hacking Database\u00a0(GHDB){<span style=\"color: #ff0000;\">GHDB\u68c0\u6d4b<\/span>}<span style=\"color: #0000ff; font-size: small;\">http:\/\/www.acunetix.com\/websitesecurity\/google-hacking\/<\/span><\/h2>\n<ul style=\"color: #666666;\">\n<li style=\"color: #1b2426 !important;\"><a style=\"color: #e00a14;\" href=\"http:\/\/www.acunetix.com\/websitesecurity\/google-hacking.htm\">Over 1200 Google Hacking Database Search Entries<br \/>\n<\/a><\/li>\n<\/ul>\n<h2>Port Scanner and Network Alerts{<span style=\"color: #ff0000;\">\u7aef\u53e3\u626b\u63cf&amp;\u7f51\u7edc\u8106\u5f31\u6027\u68c0\u6d4b<\/span>}<\/h2>\n<ul style=\"color: #666666;\">\n<li style=\"color: #1b2426 !important;\">Finds All Open Ports on Servers<\/li>\n<li style=\"color: #1b2426 !important;\">Displays Network Banner of Port<\/li>\n<li style=\"color: #1b2426 !important;\">DNS Server Vulnerability: Open Zone Transfer<\/li>\n<li style=\"color: #1b2426 !important;\">DNS Server Vulnerability: Open Recursion<\/li>\n<li style=\"color: #1b2426 !important;\">DNS Server Vulnerability: Cache Poisoning<\/li>\n<li style=\"color: #1b2426 !important;\">Finds List of Writable FTP Directories<\/li>\n<li style=\"color: #1b2426 !important;\">FTP Anonymous Access Allowed<\/li>\n<li style=\"color: #1b2426 !important;\">Checks for Badly Configured Proxy Servers<\/li>\n<li style=\"color: #1b2426 !important;\">Checks for Weak SNMP Community Strings<\/li>\n<li style=\"color: #1b2426 !important;\">Finds Weak SSL Cyphers<\/li>\n<\/ul>\n<\/div>\n<div><span style=\"color: #000000; font-size: medium;\">\u7efc\u4e0a\uff0cWVS\u4e3b\u8981\u53ef\u68c0\u6d4b\u7684\u5185\u5bb9\u4e3a9\u5927\u7c7b\uff0c63\u4e2a\u5c0f\u7c7b\u7684\u6f0f\u6d1e\u3002<\/span><\/div>\n<div><span style=\"color: #000000; font-size: medium;\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/span><\/div>\n<div><span style=\"color: #000000; font-size: medium;\">\u800c\u901a\u8fc7WVS\u9875\u9762\u4e0a\u7ed9\u51fa\u7684Web\u5e94\u7528\u7a0b\u5e8f\u7684\u8106\u5f31\u6027\u5217\u8868\u7684\u94fe\u63a5\u53ef\u4ee5\u77e5\u9053\uff1aWeb\u5e94\u7528\u7a0b\u5e8f\u5b58\u5728431\u79cd\u6f0f\u6d1e\uff08<strong><span style=\"color: #ff0000;\">Web_vul_list.txt<\/span><\/strong>\uff09\u3002<\/span><\/div>\n<div><span style=\"color: #000000; font-size: medium;\">\u6293\u53d6\u811a\u672c\u4e5f\u662f\u975e\u5e38\u7b80\u5355-&gt; <span style=\"color: #ff0000;\"><strong>py_spider_webVulList_re.py<\/strong><\/span><\/span><\/div>\n<div>\n<div><span style=\"color: #000000; font-size: medium;\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/span><\/div>\n<div><\/div>\n<div>\u8fd8\u53ef\u4ee5\u505a\u7684\u5de5\u4f5c\u5c31\u662f\uff0c\u5c06\u6293\u53d6\u7684431\u79cd\u6f0f\u6d1e\u7684\u4ecb\u7ecd\u5185\u5bb9\u9875\u9762\u4e00\u4e2a\u4e00\u4e2a\u6293\u53d6\u4e0b\u6765\uff08\u53ef\u53c2\u8003\u4e4b\u524d\u7684\u6293\u53d6Freebuf\u5de5\u5177\u5217\u8868\u7684Python\u811a\u672c\u8fdb\u884c\u6539\u5199\uff09<\/div>\n<\/div>\n<div><\/div>\n<div><span style=\"color: #000000; font-size: medium;\">See which Vulnerabilities Acunetix <strong><span style=\"color: #ff0000;\">WVS checks for<\/span><\/strong> <a href=\"http:\/\/www.acunetix.com\/support\/vulnerability-checks\/\" target=\"_blank\">http:\/\/www.acunetix.com\/support\/vulnerability-checks\/<\/a>\u00a0\u00a0\u00a0\u00a0#WVS\u53ef\u4ee5\u68c0\u6d4b\u7684\u6f0f\u6d1e<\/span><\/div>\n<div><span style=\"color: #ff0000;\"><strong>Web Application Vulnerabilities<\/strong><\/span> | Acunetix <a href=\"http:\/\/www.acunetix.com\/vulnerabilities\/\" target=\"_blank\">http:\/\/www.acunetix.com\/vulnerabilities\/<\/a>\u00a0\u00a0\u00a0\u00a0#Web\u5e94\u7528\u7a0b\u5e8f\u7684\u8106\u5f31\u6027\u5217\u8868<\/div>\n<div>&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;-<\/div>\n<div>\u4ee3\u7801\u975e\u5e38\u7b80\u5355\uff1a<\/div>\n<div>\n<pre class=\"lang:python decode:true \">#!\/usr\/bin\/env python\n#--coding: utf-8--\n\nimport sys\nimport urllib2\nimport re\nimport HTMLParser\n\nURL_REG = re.compile(r'&lt;li&gt;&lt;a href='(.+?)'&gt;', re.I)\nbaseURL = 'http:\/\/www.acunetix.com\/?post_type=page&amp;p=26&amp;vulnerability_page='\ncontent = ''\n\nfor i in xrange(1, 10):\n\tprint baseURL + str(i)\n\tcontent += (urllib2.urlopen(baseURL + str(i))).read()\n\nURL_list = URL_REG.findall(content)\n\nfp = open(\"Web_vul_list.txt\", 'a')\nfor url in URL_list:\n\tprint 'http:' + url\n\tfp.write('http:' + url + 'n')\nfp.close()\n\nprint str(len(URL_list)) + ' URL.'<\/pre>\n<p>\u56e0\u4e3a\u7528\u5230\u4e86HTMLParser\u6240\u4ee5\u8fd9\u6bb5\u4ee3\u7801\u975e\u5e38\u7b80\u5355\uff0c\u4f46\u6548\u679c\u8fd8\u4e0d\u9519`(*\u2229_\u2229*)\u2032<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u4e4b\u524d\u5728\u4f7f\u7528WVS\u7684\u65f6\u5019\u53ea\u662f\u7b80\u5355\u7684\u4f7f\u7528\uff0c\u4f46\u662f\u540e\u6765\u60f3\u77e5\u9053WVS\u5230\u5e95\u80fd\u626b\u63cf\u51fa\u90a3\u4e9b\u6f0f\u6d1e\uff0c\u5373\u5b83\u7684\u626b\u63cf\u529f\u80fd\u548c\u79cd\u7c7b\u6709\u54ea\u4e9b\uff0c\u4e00 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7,25,12],"tags":[175,8,189],"class_list":["post-387","post","type-post","status-publish","format-standard","hentry","category-programing","category-security","category-tools","tag-htmlparser","tag-python","tag-wvs"],"views":5899,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":0,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}