Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added a new section IAST and a tool called CakeFuzzer #58

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

denizilhan
Copy link

I added a tool called CakeFuzzer to the IAST category. I needed to create the IAST category to add since CakeFuzzer employs both SAST and DAST techniques.

CakeFuzzer currently has 74 stars on the GitHub. CakeFuzzer currently works stable and needs only a couple of lines of configuration to run.

Traditional methods for vulnerability discovery in web applications include:
Static Application Security Testing (SAST): This method scans the source code for vulnerabilities without executing the application.
Dynamic Application Security Testing (DAST): This method involves attacking the running application to identify vulnerabilities based on responses. However, both approaches have their drawbacks. SAST often produces a high number of false positives, while DAST may miss vulnerabilities due to limited information. Moreover, DAST requires application knowledge and security expertise to configure properly.

Cake Fuzzer aims to overcome these limitations by combining the strengths of both methods. Our unique approach, called Interactive Application Security Testing (IAST), achieves the following objectives:
Automated vulnerability discovery for CakePHP-based applications.
Elimination of application-specific knowledge or pre-configuration requirements.
Minimal or zero false positives in the results.
User-friendly scanner that requires only basic security knowledge.

I added a tool called CakeFuzzer to the IAST category. I needed to create the IAST category to add since CakeFuzzer employs both SAST and DAST techniques.

CakeFuzzer currently has 74 stars on the GitHub. CakeFuzzer currently works stable and needs only a couple of lines of configuration to run.

Traditional methods for vulnerability discovery in web applications include:

Static Application Security Testing (SAST): This method scans the source code for vulnerabilities without executing the application.
Dynamic Application Security Testing (DAST): This method involves attacking the running application to identify vulnerabilities based on responses.
However, both approaches have their drawbacks. SAST often produces a high number of false positives, while DAST may miss vulnerabilities due to limited information. Moreover, DAST requires application knowledge and security expertise to configure properly.

Cake Fuzzer aims to overcome these limitations by combining the strengths of both methods. Our unique approach, called Interactive Application Security Testing (IAST), achieves the following objectives:

Automated vulnerability discovery for CakePHP-based applications.
Elimination of application-specific knowledge or pre-configuration requirements.
Minimal or zero false positives in the results.
User-friendly scanner that requires only basic security knowledge.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant