Skip to main content

SWAT, Assure, Snapshot Testing differences

What does our application pen test cover?

Testing methodology between Outpost24 Assure, Snapshot & SWAT, our web application testing solutions

 

WASC v2 ASSURE SNAPSHOT SWAT

Abuse of Functionality

red cross green check green check

Brute Force

red cross

When safe

When safe

Buffer Overflow

red cross

Supported but not safe

Supported but not safe

Content Spoofing

green check green check green check

Credential / Session prediction

red cross green check green check

Cross-Site Scripting

green check green check green check

Cross-Site Request Forgery

red cross green check green check

Denial of Service

green check

Safe checks

Safe checks

FingerPrinting

green check green check green check

Format String

red cross green check green check

HTTP Response Smuggling

red cross green check green check

HTTP Response Splitting

red cross green check green check

HTTP Request Smuggling

red cross green check green check

HTTP Request Splitting

red cross green check green check

Integer Overflow

red cross

Supported but not safe

Supported but not safe

LDAP Injection

green check green check green check

Mail Command Injection

red cross green check green check

Null Byte Injection

green check green check green check

OS Commanding

green check green check green check

Path Traversal

green check green check green check

Predictable Resource Location

Time 

green check green check

Remote File Inclusion

green check green check green check

Routing Detour

red cross green check green check

Session Fixation

green check green check green check

SOAP Array Abuse

red cross green check green check

Server Side Include Injection

green check green check green check

URL Redirector Abuse

green check green check green check

XPath Injection

red cross green check green check

XML Attribute Blowup

red cross green check green check

XML External Entities

green check green check green check

XML Entity Expansion

red cross green check green check

XML Injection

red cross green check green check

XQuery Injection

red cross green check green check

Application Misconfiguration

green check green check green check

Directory Indexing

green check green check green check

Improper File-system Permissions

red cross green check green check

Improper Input Handling

green check green check green check

Improper Output Handing

green check green check green check

Information Leakage

green check green check green check

Insecure Indexing

green check green check green check

Insufficient Anti-Automation

red cross green check green check

Insufficient Authentication

red cross green check green check

Insufficient Authorization

red cross green check green check

Insufficient Password Recovery

red cross green check green check

Insufficient Process Validation

red cross green check green check

Insufficient Session Expiration

red cross green check green check

Insufficient Transport Layer Protection

green check green check green check

Server Misconfiguration

green check green check green check

Business Logic Flaws

red cross green check green check

Framework Vulnerability

green check green check green check

WASC v2 is a list of standardized vulnerability classifications from The Web Application Security Consortium (http://projects.webappsec.org/w/page/13246978/Threat%20Classification)

 

OWASP TOP 10 2013 ASSURE SNAPSHOT SWAT

A1-Injection

green check green check green check

A2-Broken Authentication and Session Management

green check green check green check

A3-Cross-Site Scripting (XSS)

green check green check green check

A4-Insecure Direct Object References

green check green check green check

A5-Security Misconfiguration

green check green check green check

A6-Sensitive Data Exposure

green check green check green check

A7-Missing Function Level Access Control

Time

green check green check

A8-Cross-Site Request Forgery (CSRF)

Time

green check green check

A9-Using Components with Known Vulnerabilities

green check green check green check

A10-Unvalidated Redirects and Forwards*
*server access required

green check green check green check

OWASP (Open Web Application Security Project) TOP 10 is a collection of the most commonly found and reported vulnerabilities in current web applications. It uses groupings of findings into families, and hence it is common that “OWASP COMPLETE” offerings address only subsets of the different threat families.

Outpost24 test OWASP top 10 2017 as well as 2013 where relevant.

 

Common Vulnerabilities ASSURE SNAPSHOT SWAT

Cross Site Scripting – Reflected

green check green check green check

Cross Site Scripting – Persistent

green check green check green check

Cross Site Scripting – DOM-based

green check green check green check

HTTP Header Injection

red cross green check green check

SQL Injection – Error based

green check green check green check

SQL Injection – Differentials based

green check green check green check

SQL Injection – Time Based

green check green check green check

Application Logic tested

Time

green check green check

Password lockout tested

green check green check green check

Session randomness tested

Time green check green check

Horizontal escalation testing

Time green check green check

Vertical escalation testing

Time green check green check

Insecure Direct Object Reference

Time green check green check

Web Server vulnerabilities

green check green check green check

Local File Inclusion

green check green check green check

Remote File Inclusion

green check green check green check

Use of weak encryption

green check green check green check

Use of weak standard modules

green check green check green check

Common vulnerabilities is a selection of common threats as they are mentioned in writing and in practice between security specialists, and the different methods of addressing them and those methods limitations. Tools are viewed from their ability to maintain a good coverage, there may exist singular tests with low applicability, to manage to achieve a checkbox for applications, which should not be confused with actually supporting a family of vulnerabilities.

 

Monitoring and coverage ASSURE SNAPSHOT SWAT

Zero Touch Configuration

green check green check green check

Maximum links

Time Unlimited Unlimited

Continuous detection

red cross red cross green check

Test new deployed content

red cross Remediation only green check

Detect changed credentials

red cross red cross green check

Time available for a test

3 days 30 days Continuous

Smart form testing

green check green check green check

Monitoring and coverage is the effort required to get a security review performed against an application, its ability to detect change to that application over time, and its support for learning to understand and work with a dynamic application. It is clear that the penetration test while in depth on coverage is very limited in its ability to support the organization with remediation or maintained security levels over time.

 

Verification and guidance ASSURE SNAPSHOT SWAT

False positives removed

green check green check green check

Proof of exploitability provided

green check green check green check

Vulnerability rating put in context

green check green check green check

Context Aware CVSS scoring

green check green check green check

Unlimited re-testing and verifications

30 days 30 days green check

Ask experts for advice on remediation

30 days 30 days green check

Smart vulnerability grouping

green check green check green check

Verification and guidance relates to how much effort and what degree of expert competence an organization need to maintain internally to be able to use and benefit from a solution over time. Web application security is a niche competence, and often is expensive to maintain and hone within an organization.
Vulnerability grouping is important to ensure that root cause analysis is performed to avoid high workload to address what in essence is a single root problem.

 

Production safety ASSURE SNAPSHOT SWAT

Production safe testing

Medium High High

Low traffic and database intensity

Medium Medium Low

Submits forms only when safe

red cross green check green check

Prevents dangerous link use

red cross green check green check

Production Safety relates to the risk that a scanner or test affect the test object. Often the penetration test is also not production safe, but it can be on specific request, and hence it has been evaluated with this considered a key priority for the client.
Production safety is key for business critical applications, any customer facing applications or any applications where data integrity is of importance.

 

Support ASSURE SNAPSHOT SWAT

Onboarding call

red cross green check green check

Vulnerability discussions

green check green check green check

Verification and remediation support

green check green check green check

Professional support directly in tolls

green check green check green check

Access to security specialists

30 days 30 days Unlimited

Support is important to ensure that you have full value from a solution and can work quickly to resolve both findings and technical problems.
Most applications are delivered with a limited support, mainly focused on pure tool support such as license questions and usage. Penetration testing usually carry an excellent support during the test itself, but come without long term commitments from the partner as this is a one of engagement where the business transaction and relationship ends with the delivery of the report.
Sometimes penetration testers offer a re-test to verify that problems are resolved, but it is a one off engagement also in this case, meaning ongoing verifications as you remediate is not available, and in case a problem is not solved, having one more verification later can be a challenge.

 

Legend

Fulfilled

green check

Partially fulfilled

/

Not fulfilled

red cross

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Looking for anything in particular?

Type your search word here