Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ REST-Attacker - Designed As A Proof-Of-Concept For The Feasibility Of Testing Generic Real-World REST Implementations

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š REST-Attacker - Designed As A Proof-Of-Concept For The Feasibility Of Testing Generic Real-World REST Implementations


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: kitploit.com


REST-Attacker is an automated penetration testing framework for APIs following the REST architecture style. The tool's focus is on streamlining the analysis of generic REST API implementations by completely automating the testing process - including test generation, access control handling, and report generation - with minimal configuration effort. Additionally, REST-Attacker is designed to be flexible and extensible with support for both large-scale testing and fine-grained analysis.

REST-Attacker is maintained by the Chair of Network & Data Security of the Ruhr University of Bochum.


Features

REST-Attacker currently provides these features:

  • Automated generation of tests
    • Utilize an OpenAPI description to automatically generate test runs
    • 32 integrated security tests based on OWASP and other scientific contributions
    • Built-in creation of security reports
  • Streamlined API communication
    • Custom request interface for the REST security use case (based on the Python3 requests module)
    • Communicate with any generic REST API
  • Handling of access control
    • Background authentication/authorization with API
    • Support for the most popular access control mechanisms: OAuth2, HTTP Basic Auth, API keys and more
  • Easy to use & extend
    • Usable as standalone (CLI) tool or as a module
    • Adapt test runs to specific APIs with extensive configuration options
    • Create custom test cases or access control schemes with the tool's interfaces

Install

Get the tool by downloading or cloning the repository:

git clone https://github.com/RUB-NDS/REST-Attacker.git

You need Python >3.10 for running the tool.

You also need to install the following packages with pip:

python3 -m pip install -r requirements.txt

Quickstart

Here you can find a quick rundown of the most common and useful commands. You can find more information on each command and other about available configuration options in our usage guides.

Get the list of supported test cases:

python3 -m rest_attacker --list

Basic test run (with load-time test case generation):

python3 -m rest_attacker <cfg-dir-or-openapi-file> --generate

Full test run (with load-time and runtime test case generation + rate limit handling):

python3 -m rest_attacker <cfg-dir-or-openapi-file> --generate --propose --handle-limits

Test run with only selected test cases (only generates test cases for test cases scopes.TestTokenRequestScopeOmit and resources.FindSecurityParameters):

python3 -m rest_attacker <cfg-dir-or-openapi-file> --generate --test-cases scopes.TestTokenRequestScopeOmit resources.FindSecurityParameters

Rerun a test run from a report:

python3 -m rest_attacker <cfg-dir-or-openapi-file> --run /path/to/report.json

Documentation

Usage guides and configuration format documentation can be found in the documentation subfolders.

Troubleshooting

For fixes/mitigations for known problems with the tool, see the troubleshooting docs or the Issues section.

Contributing

Contributions of all kinds are appreciated! If you found a bug or want to make a suggestion or feature request, feel free to create a new issue in the issue tracker. You can also submit fixes or code ammendments via a pull request.

Unfortunately, we can be very busy sometimes, so it may take a while before we respond to comments in this repository.

License

This project is licensed under GNU LGPLv3 or later (LGPL3+). See COPYING for the full license text and CONTRIBUTORS.md for the list of authors.



...



๐Ÿ“Œ Oracle Hires Global Specialists To Explore Feasibility of Buying Accenture


๐Ÿ“ˆ 29.15 Punkte

๐Ÿ“Œ Cleveland-Chicago Hyperloop Line Gets Feasibility Study


๐Ÿ“ˆ 29.15 Punkte

๐Ÿ“Œ The Feasibility Of Tape Backup Against Ransomware


๐Ÿ“ˆ 29.15 Punkte

๐Ÿ“Œ Technical feasibility of "borrowing" pieces from Windows to support Windows drivers - also apps, etc


๐Ÿ“ˆ 29.15 Punkte

๐Ÿ“Œ Feasibility study "Encrypted Computing" handed over to Cyberagentur


๐Ÿ“ˆ 29.15 Punkte

๐Ÿ“Œ Interest/feasibility of MBP 2016+ WiFi driver development?


๐Ÿ“ˆ 29.15 Punkte

๐Ÿ“Œ Generic:ASP/Backdoor.Generic.A


๐Ÿ“ˆ 26.89 Punkte

๐Ÿ“Œ Generic:BIN/Trojan.Generic.A


๐Ÿ“ˆ 26.89 Punkte

๐Ÿ“Œ Generic:PHP/Redirect.Generic.B


๐Ÿ“ˆ 26.89 Punkte

๐Ÿ“Œ Generic:PHP/Upload.Generic.A


๐Ÿ“ˆ 26.89 Punkte

๐Ÿ“Œ Generic:PHP/Irc.Generic.A


๐Ÿ“ˆ 26.89 Punkte

๐Ÿ“Œ Generic:PHP/Id.Generic.A


๐Ÿ“ˆ 26.89 Punkte

๐Ÿ“Œ What is IDP.Generic? How to Remove IDP.Generic Virus?


๐Ÿ“ˆ 26.89 Punkte

๐Ÿ“Œ Kryptowรคhrungen: Das unterscheidet Proof-of-Work und Proof-of-Stake


๐Ÿ“ˆ 25.57 Punkte

๐Ÿ“Œ WHAT IS THE DIFFERENCE BETWEEN PROOF OF WORK AND PROOF OF STAKE?


๐Ÿ“ˆ 25.57 Punkte

๐Ÿ“Œ Testing Assumptions in Real Estate: A Dive into Hypothesis Testing with the Ames Housing Dataset


๐Ÿ“ˆ 22.87 Punkte

๐Ÿ“Œ Performance Testing vs. Load Testing vs. Stress Testing


๐Ÿ“ˆ 22.31 Punkte

๐Ÿ“Œ MCS2023 โ€” A generic Real Time RTC layer for the matrix ecosystem and Element Call


๐Ÿ“ˆ 21.45 Punkte

๐Ÿ“Œ CVE-2022-22971 | Oracle Utilities Testing Accelerator 6.0.0.1.3/6.0.0.2.4/6.0.0.3.3 Generic denial of service


๐Ÿ“ˆ 20.88 Punkte

๐Ÿ“Œ DEFCON 17: Smart Parking Meter Implementations


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ OpenSSH Implementations with X11Forwarding Enabled Should Heed Recent Security Update


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ DEFCON 17: Smart Parking Meter Implementations


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ OpenSSH Implementations with X11Forwarding Enabled Should Heed Recent Security Update


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ Equifax couldn't find or patch vulnerable Struts implementations


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ DEF CON 25 ICS Village Blake Johnson Dissecting Industrial Wireless Implementations


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ Top 5 Barriers to Security Implementations


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ Flawed BIOS Implementations Lead to Intel Boot Guard Bypass


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ Many Bluetooth Implementations and OS Drivers Affected by Crypto Bug


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ Researchers Find Flaws in WPA2's 4-way Handshake Implementations


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ Vuln: Multiple TLS And DTLS Implementations CVE-2013-0169 Information Disclosure Vulnerability


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ DEF CON 26 AI VILLAGE - Kang Li - Beyond Adversarial Learning Security Risks in AI Implementations


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ SSD manufacturers with the best secure erase implementations/software (hdparm or proprietary tools)?


๐Ÿ“ˆ 20.36 Punkte

๐Ÿ“Œ Is there implementations of ecosystem ?


๐Ÿ“ˆ 20.36 Punkte











matomo