ARC Advance WebScan

ARC Advance WebScan

This ARC Advance WebScan, web application performs a security scan of a specified URL to check for various vulnerabilities in the target web application. The application is built using Flask, a Python web framework, and employs BeautifulSoup for parsing HTML to detect certain security issues.

Here is my ARC Advance WebScan: ARC

These are Security Tests :

o SQL Injection Test: Tests if the application is vulnerable to SQL injection by appending a common SQL injection payload (’ OR ‘1’='1) to the URL’s query string and checking for specific error messages or behaviors in the response.

o Cross-Site Scripting (XSS) Test: Checks if the application is vulnerable to XSS by injecting a simple payload in the URL’s query parameters and checking if the payload is reflected back in the response.

o Cross-Site Request Forgery (CSRF) Check: Scans for the presence of CSRF tokens in form submissions. If a form is found without a hidden input field for a CSRF token, it flags it as vulnerable to CSRF.

o Open Redirect Test: Attempts to trigger an open redirect vulnerability by appending a malicious URL to the /redirect endpoint and checking if the application redirects to that URL. If it does, it indicates an open redirect vulnerability.

o Security Headers Check: Checks for the presence of important security headers (X-Content-Type-Options, Content-Security-Policy, X-Frame-Options). Missing headers are flagged as vulnerabilities.

o Directory Traversal Test: Checks for directory traversal vulnerabilities by attempting to access system files (like /etc/passwd) via URL manipulation (e.g., …/etc/passwd). If the content of the file is found, it indicates a directory traversal vulnerability.

Note: It is Python Flask Deployment, That’s Why it takes some time to load…

I’d love to hear your thoughts and Suggestions! :bulb:

10 Likes