Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
992Proxy

Locked PHP Vulnerability Hunter 1.4.0.20 Alpha


sQuo

Recommended Posts

This is the hidden content, please

 

 

PHP Vulnerability Hunter is an advanced whitebox PHP web application fuzzer that scans for several different classes of vulnerabilities via static and dynamic analysis. By instrumenting application code, PHP Vulnerability Hunter is able to achieve greater code coverage and uncover more bugs.

Key Features

Automated Input Mapping

While most web application fuzzers rely on the user to specify application inputs, PHP vulnerability hunter uses a combination of static and dynamic analysis to automatically map the target application. Because it works by instrumenting application, PHP Vulnerability Hunter can detected inputs that are not referenced in the forms of the rendered page.

Several Scan Modes

PHP Vulnerability Hunter is aware of many different types of vulnerabilities found in PHP applications, from the most common such as cross-site scripting and local file inclusion to the lesser known, such as user controlled function invocation and class instantiation.

PHP Vulnerability Hunter can detect the following classes of vulnerabilities:

 

 

  • Arbitrary command execution
  • Arbitrary file read/write/change/rename/delete
  • Local file inclusion
  • Arbitrary PHP execution
  • SQL injection
  • User controlled function invocatino
  • User controlled class instantiation
  • Reflected cross-site scripting (XSS)
  • Open redirect
  • Full path disclosure

 

Code Coverage

 

Get measurements of how much code was executed during a scan, broken down by scan plugin and page. Code coverage can be calculated at either the function level or the code block level.

 

Scan Phases

 

Initialization Phase

During this phase, interesting function calls within each code file are hooked, and if code coverage is enabled the code is annotated. Static analysis is performed on the code to detect inputs.

 

Scan Phase

This is where the bugs are uncovered. PHP Vulnerability Hunter iterates through its different scan plugins and plugin modes, scanning every file within the targeted application. Each time a page is requested, dynamic analysis is performed to discover new inputs and bugs.

Uninitialization

Once the scan phase is complete, all of the application files are restored from backups made during the initialization phase.

 

 

PHP Vulnerability Hunter 1.4.0.20 Unstable

This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.