Automated Application Security Testing

Rate this content
Bookmark

Traditional security testing for JS apps has focused on the front-end, but actual security issues most often lie in the backing REST API. Join StackHawk co-founder Scott Gerlach for a quick overview of why you need to rethink how you test your JS apps and how StackHawk can help you find and fix security bugs fast.

This talk has been presented at React Summit 2022, check out the latest edition of this React Conference.

FAQ

StackHawk is a dynamic application security testing tool designed to test running HTTP applications and API endpoints to identify and fix security bugs, preventing vulnerabilities in software applications.

StackHawk runs active security tests against your running applications to ensure safe handling of user input and output, and to implement best practices for application security based on the OWASP top 10.

StackHawk can test various types of applications including REST API, GraphQL API, SOAP API, server-side applications, and single-page applications.

Yes, StackHawk is built for automation with CI/CD integration, allowing developers to include security testing in their development lifecycle and receive feedback directly within their CI/CD processes.

StackHawk emphasizes simplicity and efficiency, providing tools like a YAML configuration that lives with your code, simple descriptions of security issues, and examples to help developers quickly identify and fix security bugs.

Most customer applications using StackHawk have scan durations that average around or under 10 minutes, thanks to optimizations like placing the scanner close to the application and using open standards for informing the scanner.

Yes, StackHawk can notify teams via Slack channels, publish information to Data Dog, or send web hook messages that teams can use to process scan results and take necessary actions.

StackHawk provides detailed information on security issues including simple curl commands for replaying attacks, which help developers understand, recreate, and fix issues efficiently. It also allows for creating JIRA tickets directly from the scan interface to manage issue resolution.

Scott Gerlach
Scott Gerlach
9 min
21 Jun, 2022

Comments

Sign in or register to post your comment.

Video Summary and Transcription

StackHawk is a dynamic application security testing tool that helps developers find and fix security issues. The scan identified a SQL injection issue and a cross site scripting issue. The StackHawk YAML is used to configure the scanner with important information such as the application's location, environment, and ID. The scanner can also be pointed at open API spec or GraphQL definitions. Try StackHawk for free at stackhawk.com and integrate it into your development process to improve software quality.

1. Introduction to StackHawk

Short description:

StackHawk is a dynamic application security testing tool that helps developers find and fix security issues. It runs active security tests against running applications, handles user input and output safely, and implements OWASP top 10 best practices. The scanner is configured via YAML and provides simple descriptions and examples of patterns to help identify and fix issues. StackHawk integrates with CI/CD workflows and major CI platforms, and it can notify scan results in Slack, Data Dog, or via web hook.

What's going on, React people? I'm Scott Gerlach, co-founder and chief security officer over here at StackHawk. I hope you're really enjoying React Summit.

Let's talk about StackHawk. Quickly, StackHawk is a dynamic application security testing tool. You can use it to test your running HTTP applications and API endpoints for security bugs and keep them from becoming vulnerable. You can use StackHawk to run active security tests on your running REST API, GraphQL API, soap API, server-side application, and single-page applications. StackHawk was built for automation and CI CDE to be part of your robust testing strategy for your application development life cycle. It also makes finding, understanding, and fixing security bugs easy.

How does StackHawk work, you ask? Great question! StackHawk runs active security tests against your running applications to ensure that your application is handling user input and output in a safe manner, as well as implementing OWASP top 10 best practices for application security. We can do this against your running application on your local host, in CI CDE workflows, and against applications that have yet to be published on the internet. We also made dynamic testing fast. By placing the scanner as close to the application as possible and by using open standards to inform the scanner, OpenAPI spec, GraphQL, introspection queries, SOAP, WSDL, in addition to the scanner tuning we've made, most StackHawk customer applications scan average around or under 10 minutes.

Finding and fixing security issues is simple with StackHawk. Our focus as a company is to help developers find and most importantly fix security issues. The Stackhawk scanner and platform are built around this simplicity model. The scanner is configured via YAML that lives with the code for the application that you're testing. When StackHawk findings are triaged, the platform is trying to give you the simplest version of the information needed to help you quickly understand what the problem is, with simple descriptions and examples of patterns to help you identify the anti-pattern, be able to recreate the issue with simple curl command to replay the attack, and get you into debug mode stepping through code as fast as possible to help you fix issues and get back to your regular job of creating value for your customers. All of this is CI CD enabled. Again, you can integrate this into your CI process and importantly get feedback into the CI process on scan findings. This information can be used to break a build if you choose. Based on severity of un-triage findings, most of the major CI player logos are shown here on this slide, and even if your particular one isn't, chances are pretty good Stackhawk will work in your platform as long as it can run a Docker container. You can run Docker, you can run Stackhawk. You can also see here Stackhawk integrates with your workflow and information tools. We can notify you of your scan results in a Slack channel, publish that information to Data Dog, or send you a simple web hook message that you can then use to process and do with the data what you choose.

Let's take a look at what running the Stackhawk scanner looks like. As you can see here, I've got a standard server side application. This one is a Pulse app that I want to test for security issues. So over here on my command line, I've got a simple Docker command that I ran. So Docker run Stackhawk, I fed it the stack on yamel, we'll look at that in a second. As you can see, it did a standard crawl looking for all the interesting things on the webpage that it could and then it did an attack.

2. Analysis of Scan Findings and SQL Injection Issue

Short description:

The scan identified a SQL injection issue and a cross site scripting issue. The SQL injection issue is explained, along with the risks it poses and links to prevent it in different language frameworks. A specific issue is highlighted on the polls SQL path, where a post method has an issue. The scanner's request and response are shown, including a Case When injection. The Validate button provides a curl command to reproduce the attack. The StackHawk YAML code for the polls application is also provided.

So it actively attacked this application for potential security issues. When it was all done, we've got a summary of these findings. So I've actually got a SQL injection issue that I need to take care of, you can see that it's new. I also have a cross site scripting issue that I've done something with before, I actually made a ticket out of this. So now it's in an assigned status. We've got a bunch of other things that we can look at as well. But let's take a look at those two.

Down here at the bottom, we actually have a link to this scan. So we can actually take this link and paste it into a browser. By the way, output in a CICD system would look very much like this, because this is the standard output. So if you did choose to break a build, you would have this same link in CICD output. So we can go over here to our web browser and jump right into the scan that we were looking at. We were just looking at this exact same scan. We've got this SQL injection issue that we can look at quickly. You can see that we've got a SQL injection issue. We're quickly describing what SQL injection is, how to remediate it, what it's about, and what risks it might pose to an application. We also have links to different language frameworks that show you the pattern of how to prevent SQL injection in Spring, Laravel, Django, and Rails so that you can help identify the anti-pattern that we're looking for.

Let's take a look at this particular issue here. We can see that on the polls SQL path, we have a post method that has some kind of an issue. Over on our right-hand panel, we've got a request and response of what the scanner actually did and then came back with. We can see that the scanner made a request here against the application and it responded in some form or fashion. We can actually see that the scanner made a Case When injection here. We can replay this if we wanted to. This is all helping you understand what the scanner is trying to do and what issue it thinks it's found. But, interestingly, we've got this really cool Validate button up here. As I mentioned before, this Validate button gives you a curl command of exactly what the scanner did to identify this particular issue. So, you can copy and replay this attack against an application. Let's take a look at that StackHawk YAML. Here you can see the code that I've used to build my polls application. Inside of this repository, I've also stored the StackHawk YAML.