Tip

Testing rich Internet applications: 2009's best free tools

Beaver
Web application exploits and testing tools have evolved a lot since I wrote about

Requires Free Membership to View

free Web application testing tools for SearchSoftwareQuality.com over a year ago. So, I think it's timely to cover today's best-of-breed free tools for ferreting out flaws in rich Internet applications (RIAs).

First off, we've been hearing a lot about Ajax vulnerabilities. Be it vendor marketing hype or the Facebook, Twitter, and similar exploits around the world I do see client-side attacks as an evolving problem. There are also Web services concerns. I'm finally starting to see developers, QA analysts, and security managers question how safe their Web services really are and rightly so.

Before I go any further, I want to be clear that finding vulnerabilities in Web 2.0 apps is as much -- often more -- of a manual analysis task. This is due in part to the complexity of these applications as well as the relative immaturity of the testing tools available.

Here are some free tools to help you in your work with RIAs:

Firefox WebDeveloper is a tool for local JavaScript analysis and enabling/disabling scripts to see how the application behaves. Side note: I recently came across a situation whereby ASP files could be uploaded to a Web server by simply disabling JavaScript on the Web browser. A tool such as this makes it easy to seek out this type of client-side behavior. It's also good for general analysis of application logic as well as flaws in forms and RSS feeds.

HTTrack is not a RIA-specific tool, but you can use it for general site perusal as well as local application logic analysis. A tool like this is great for analyzing sites and code locally without having to be connected to the application in real time.

Ratproxy is Google's answer to security scanning that uncovers scripting problems that can lead to XSS and XSRF. In practicaly every security testing situation, you need to use multiple tools. A tool like Ratproxy provides a good way to get yet another security perspective of your Internet presence.

SWFScanM is a tool with its roots in HP's WebInspect that decompiles Shockwave Flash (.swf) files to find vulnerabilities within the source code. This type of tool allows you to view Flash like never before. Many people don't consider the issues that a Flash-based applicaiton can pose. A quick search of the National Vulnerability Database shows dozens over the past few years alone.

Sandboxie is free for personal use only. Still, this tool can be handy when used to isolate the Web browser and everything that's going on within it. That process allows you to probe and analyze rich Internet application behavior on a clean-browser install in a sandboxed environment without any other plug-ins or applications getting in the way.

WSDigger is a Web services scanning/analysis framework for exploiting XSS, SQL injection and more. This class of tool allows you to uncover and exploit XSS, SQL injection and more security issues associated with often-overlooked Web services.

WSFuzzer is a SOAP Web services penetration testing tool for creating fuzz attack strings and more. It can give you yet another perspective of your Web services.

Web 2.0 and rich Internet applications are a broadly defined group, and the security tools are still relatively sparse. In my article on techniques for testing RIAs, you'll find more information. Again, don't overlook the manual analysis component of these Web technologies when seeking out security weaknesses.

The reality is that rich Internet applications and their associated attack vectors aren't going away. Familiarizing yourself with this set of tools now will get you off to a solid start in the right direction towards enhanced Web application security overall.


About the author: Kevin Beaver is an independent information security consultant, speaker and expert witness with Atlanta-based Principle Logic, LLC. He has over 20 years experience in the industry and specializes in performing independent information security assessments revolving around compliance and information risk management. Kevin has authored/co-authored seven books on information security including the ethical hacking books, Hacking for Dummies and Hacking Wireless Networks for Dummies (Wiley). He's also the creator of the Security On Wheels IT security audio books.


This was first published in May 2009

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.