WEBVTT

00:07.160 --> 00:12.890
Web application vulnerability scanners are automated tools designed to scan web applications, whether

00:12.890 --> 00:18.230
it be a server or a website, or numerous other applications that you might find on the web.

00:18.260 --> 00:24.080
A lot of those web applications look for certain specific vulnerabilities, denoted with web servers

00:24.080 --> 00:30.980
and applications such as SQL injection, cross-site scripting, directory traversal, even cross-site

00:30.980 --> 00:32.060
request forgery.

00:32.060 --> 00:35.390
There's different tools utilized to perform these different objectives.

00:35.420 --> 00:41.030
Nikto is a command line web vulnerability scanner that excels at searching for specific vulnerabilities,

00:41.030 --> 00:46.760
including SQL injection, command injection, cross-site scripting, and cross-site request forgery.

00:46.790 --> 00:53.570
These vulnerabilities are often dictated on websites or web applications that could pose serious vulnerabilities

00:53.570 --> 00:56.120
with the exact applications utilizing.

00:56.120 --> 00:58.310
So why is it command line based?

00:58.340 --> 01:04.880
Well, that that entails a low resource involvement, making it incredibly easy to use without taking

01:04.880 --> 01:06.770
up a lot of system resources.

01:08.240 --> 01:13.310
Another tool is called OWASp or OWASp Zed Attack Proxy.

01:13.310 --> 01:20.480
This was designed with the Web Application Security Project, or OWASp to identify web application vulnerabilities

01:20.480 --> 01:24.260
within both web applications as well as websites within it.

01:24.290 --> 01:27.230
We can see the detection of man in the middle attacks.

01:27.410 --> 01:33.260
Other features include the ability to identify vulnerabilities and then list them out.

01:33.290 --> 01:39.650
Uh, OWASp is a great tool if you need that graphical user interface, unlike Nikto, where it gives

01:39.650 --> 01:44.510
a bare minimum and kind of tells you what's going on or defines the vulnerability.

01:44.540 --> 01:50.930
OWASp actually tells you or provides some, uh, hints on how to actually fix it so you can identify

01:50.960 --> 01:51.680
a vulnerability.

01:51.680 --> 01:54.890
And then it goes through and it says, hey, this is how I would fix it.

01:54.920 --> 02:00.500
OWASp does, uh, network management or I shouldn't say network management as much as network scanning

02:00.530 --> 02:03.590
to identify different vulnerabilities within the network as a whole.

02:03.590 --> 02:09.830
It also offers a fuzzer something that Nikto doesn't, which provides us of throwing trash at a web

02:09.860 --> 02:12.590
application or a website to see what happens.

02:12.620 --> 02:16.970
Uh, OWASp is a great graphical user interface tool, and most students find this to be a little bit

02:16.970 --> 02:18.920
easier to use than something like Nikto.

02:20.480 --> 02:25.040
Arachne, on the other hand, is a Ruby web based application scanner.

02:25.040 --> 02:30.590
It emphasizes speed by conducting parallel scans, allowing scalability without the performance loss.

02:30.590 --> 02:36.580
So again, another low resource tool that's utilized to find different items and different vulnerabilities

02:36.580 --> 02:38.770
within our web applications and websites.

02:38.770 --> 02:41.740
It searches for the same things that a lot of what Nikto does.

02:41.740 --> 02:46.900
It looks for SQL injection, cross-site request forgery, code injection, and of course, cross-site

02:46.930 --> 02:48.880
scripting, among other tools.

02:48.880 --> 02:53.650
The main thing that sets this one apart is that it provides a little bit of training as it goes.

02:53.650 --> 02:58.990
It may identify a vulnerability or a problem site, and then it says, hey, let's investigate this

02:58.990 --> 02:59.500
further.

02:59.500 --> 03:03.460
And it kind of gives you that that range of teachable moments when it goes through.

03:04.720 --> 03:06.880
Lastly, we have something called Burp Suite.

03:06.910 --> 03:14.200
Now Burp Suite is a very robust tool that can identify different ports and it searches for SQL injections,

03:14.200 --> 03:15.430
cross-site scripting.

03:15.430 --> 03:18.130
It is enormous when it comes to its abilities.

03:18.130 --> 03:23.680
We identify it as being a web application scanner, but it does so much more.

03:23.800 --> 03:28.630
It provides different aspects to actually identify man in the middle attacks, and it helps you perform

03:28.630 --> 03:29.710
those man in the middle attacks.

03:29.710 --> 03:35.230
If you're trying to pull something off uh, it can identify traffic going both from the site and back

03:35.230 --> 03:36.970
to its repository.

03:36.970 --> 03:43.750
Uh, it just provides a great deal of not only vulnerability scanning capabilities for websites and

03:43.750 --> 03:49.420
web applications, but also the ability to actually exploit those web application vulnerabilities.
