This is a collection of static and dynamic security testing tools (SAST/DAST) from Timo Pagel. Initially created for team security checks along with a simplified OWASP Testing Guide v4 Checklist (see https://github.com/wurstbrot/OWASP-Testing-Checklist).
192.168.205.86 securitytest.local
This will start an existing or create a new box (if not already created).
vagrant up
vagrant ssh
If you were asked for a password enter 'vagrant'.
##Usage of SAST-Tools:
- PHP_CodeSniffer (Code Style):
sudo ./.config/composer/vendor/bin/phpcs /srv/www/skeleton.local/htdocs/
<
project>
- pixy:
sudo /home/vagrant/pixy/run-all.pl /srv/www/skeleton.local/htdocs/
<
project>
/file - RIPS: http://securitytest.local/rips/index.php
- Web Application Protector:
cd /home/vagrant/wap-2.1 && java -Xmx2g -Xss1g -jar /home/vagrant/wap-2.1/wap.jar -a -all -p /srv/www/skeleton.local/htdocs/
<
project>
- SensioLabs Security Checker: https://github.com/sensiolabs/security-checker
- composer-versions-check: https://github.com/Soullivaneuh/composer-versions-check
- retire.js:
sudo retire --js --jspath /srv/www/skeleton.local/htdocs/
<
project>
- jsprime: http://securitytest.local:8888/
- eslint:
cd
<
project>
&& eslint .
#Usage of DAST-Tools:
- arachni:
/home/vagrant/arachni-1.4-0.5.10/bin/arachni_web --host 0.0.0.0 &
, go to http://securitytest.local:9292/ (admin@admin.admin / administrator); Tipp: Use autologin Plugin - Nessus, go to http://www.tenable.com/products/nessus-vulnerability-scanner
- metasploit, go to https://www.rapid7.com/products/metasploit/download.jsp
- retire.js:
sudo retire --js --jspath /srv/www/skeleton.local/htdocs/
<
project>
- sqlmap:
/home/vagrant/sqlmap/sqlmap.py -u http://project.local/index.php?x=1
- testssl.sh: /home/vagrant/testssl.sh/testssl.sh https://www.fhunii.com
- OWASP Zap: Go to https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project and follow instructions
#Examples for Infrastructure-Tests
- Lynis: /home/vagrant/lynis/lynis audit system --auditor "Timo Pagel"
- Iniscan: /home/vagrant/.config/composer/vendor/psecio/iniscan/bin/iniscan scan --path <path-to-php.ini>