Penetration testing

Web Services Penetration Testing Part 3: Automation with AppScan and Webinspect

Nutan Panda
November 21, 2013 by
Nutan Panda

In the previous article, we discussed the importance of tools in penetration testing, how automation helps in reducing time and effort, and how to automate web services penetration testing using soapUI Pro.

What should you learn next?

What should you learn next?

From SOC Analyst to Secure Coder to Security Manager — our team of experts has 12 free training plans to help you hit your goals. Get your free copy now.

In this article, we will be focusing on what other options are available to automate web services penetration testing.

Feasibility

To perform web services penetration testing, soapUI Pro is one of the best options, but in certain conditions you might search for other options: For example, you are not into regular web services penetration testing. or your budget is very low for a penetration testing that consists of web application penetration testing along with web services penetration testing, or you don't have much experience in performing web services penetration testing.

For these conditions, you need something that comes as a package. A tool for web application penetration testing as well as web services penetration testing. A tool where you just click next, next, next, and it will provide you the result of web services penetration testing. A tool where you can throw the WSDL and get the result. You might choose one of these very popular web application penetrations testing tools, IBM AppScan or HP WebInspect.

AppScan

IBM Security AppScan (http://www-03.ibm.com/software/products/us/en/appscan/) is one of the most popular and widely used automation tools in the arena of web application penetration testing. It allows penetration testers to automate their web application penetration testing to find out the vulnerabilities present in the application. Most penetration testers use it for only web application penetration testing but it can be also used to test web services to identify the vulnerabilities present. Now we will focus on how web services penetration testing is done by IBM Security AppScan.

Testing Web Services Using AppScan

Testing a Web Service using AppScan differs slightly from testing a normal web application because AppScan uses a separate client to explore the web services. That separate client is called the Generic Services Client (GSC).

Generic Service Client (GSC)

It uses the WSDL file of a web service to display the individual methods available in a tree format, and it creates a user-friendly GUI for sending requests to the service. You can use this interface to select methods, one by one, and to input the required values of the parameters. Simultaneously you can also send the request to the server to view the results in the form of the response. These processes are recorded by AppScan and later used to create test cases based on the number of requests made by the GSC for the service.

Configuration

You need to configure AppScan properly with the required options to perform a web services penetration test. As we learned from "Web Services Penetration Testing Parts 1 and 2," we need a WSDL file or URL to perform web services penetration testing properly. We will test the web services of http://www.testfire.net/bank/ws.asmx?WSDL. It's always better to have sample test data (SOAP requests and responses) to test web services properly but, since we are performing black box testing, we will provide the format of data needed to perform the testing.

Open AppScan to start the web services penetration testing. AppScan will start with the window shown in Figure 1.

Figure 1: New Window

This window will show the recent scans and the option to "Create New Scan." Click on that option. The "New Scan" window will open, as shown in Figure 2.

Figure 2: New Scan Window

This "New Scan" window will show the "Recent Templates" used and also option to select one of the "Predefined Templates." Select "Regular Scan" from the "Predefined Templates." By clicking on the "Regular Scan" template, the "Scan Configuration Wizard" window will open, as shown in Figure 3.

Figure 3: Scan Configuration Window

In the "Scan Configuration Wizard," select "Web Services Scan" and click on "Next" to open a window where you need to provide the WSDL file or WSDL URL, as shown in Figure 4.

Figure 4: URL and Servers Window

If you need to configure any additional settings for proxy or HTTP authentication, you can configure them here, but to test the web services, I will continue with the default settings, as shown in Figure 5.

Figure 5: URL and Servers Window

Click on "Next" to open the "Test Policy" window, as shown in Figure 6.

Figure 6: Test Policy Window

Here you will find a predefined policy present to test SOAP-related tests, i.e., "Web Services." Select "Web Services." If you want to check what are the test cases associated with this policy, just click on the "Full Scan Configuration" link, which is in the left bottom corner of this window, under "General Tasks." Clicking on the "Full Scan Configuration" link will open a new "Full Scan Configuration" window, as shown in Figure 7.

Figure 7: Full Scan Configuration Window

Select the "Test Policy" tab, which is on the left side of the window under "TEST," to view the test cases included in this Web Services policy. Under the "No Grouping" option when you start exploring the test cases, you will see three types of buttons:

  1. Disabled
  2. Enabled
  3. Partially Enabled

Below mentioned are some of the classes of test cases included in this policy.

  1. XML External Entities
  2. Information Leakage
  3. Insufficient Authentication
  4. SQL Injection
  5. Cross Site Scripting
  6. Directory Indexing
  7. Abuse of functionality
  8. Session Fixation
  9. OS Commanding
  10. Format String
  11. Brute Force
  12. Insecure Indexing
  13. LDAP Injection
  14. Content Spoofing
  15. Remote File Inclusion
  16. Null Byte Injection
  17. SSI Injection
  18. Insufficient Session Expiration
  19. Insufficient Transport Layer Protection
  20. HTTP Response Splitting
  21. Path Traversal
  22. XPath Injection

After exploring the test cases included, click on "OK" to close the full scan configuration window, then click on "Next" to complete the configuration wizard and it will open a new window, as shown in Figure 9.

Figure 9: Complete Scan Configuration Window

This window shows that you have successfully completed the scan configuration wizard and also provides information how to start the test by exploring web services methods using GSC. Click on "Finish" to launch GSC, where GSC will import all the methods available in the provided WSDL file as shown in Figure 10.

Figure 10: GSC Window

This GSC shows all the imported methods under "Request Library." Now you need to edit each method request and provide a value for the required parameter with the required data type in the edit request option, as shown in Figure 11.

Figure 11: GSC

I selected the "IsValidUSer" method and clicked on the "UserId" parameter. It requires a string datatype value. Now provide a string datatype value and invoke the request. I provided the value 1 and clicked on the "Invoke" button; the response I got is shown in Figure 12.

Figure 12: GSC Request Editor

Similarly select all the methods, put the required data type value in the parameters, and invoke the requests one by one. After completion of all the invocation of requests, close the GSC window. Now AppScan will record all the requests and generate the test cases to start web services penetration testing, as shown in Figure 13.

Figure 13: AppScan Test Window

As you can see, AppScan fetched all the requests from GSC request history and is all set to start the test. Just click on the "Test Only" option in the top left corner to start the test. After completion of all test cases, you will get the result in AppScan, as shown in Figure 14.

Figure 14: AppScan Result

Here are the results of the web service scan using AppScan. Now you can use AppScan to test any web service to discover the vulnerabilities present. And you need to verify it manually to avoid False-positive.

WebInspect

HP WebInspect (http://www8.hp.com/in/en/software-solutions/software.html?compURI=1341991) is another very popular tool for web application penetration testing. It uses real-world hacking techniques and attacks to thoroughly analyze your web applications and web services to identify security vulnerabilities. It contains some features in web services penetration testing that make it one of the popular black box web services penetration testing tools. Now we will focus on how to test web services using HP WebInspect.

Open WebInspect and you will find its start page containing "Recently Opened Scans," "Scans Scheduled for Today," "WebInspect Messages," "What's new in WebInspectxx.x!" (where "xx.x" is the version of WebInspect you are using), along with options to start a new scan, as shown in Figure 15.

Figure 15: WebInspect Start Page

Click on "Start a Web Service Scan," which will open a "Web Service Scan Wizard," as shown in Figure 16.

Figure 16: Web Service Scan Window

Select "Configure a Web Service Scan" and in the space for "WSDL Location" insert your WSDL URL. In my case, I am using the same http://www.testfire.net/bank/ws.asmx?WSDL. And in "Scan Name" enter a name. I am using testfire, as shown in Figure 17.

Figure 17: Web Service Scan Window

Click on "Next" to get the "Authentication and Connectivity" window, where you have to provide all the required details, as shown in Figure 18.

Figure 18: Authentication and Connectivity Window

As in our case we don't need any "Network Proxy" or "Network Authentication," uncheck the "Network Proxy" option, as shown in Figure 19.

Figure 19: Authentication and Connectivity Window

Click on "Next" to open the next window, which contains "Detailed Scan Configuration" but, before that you will be prompted with a pop-up, "Would you like to launch the Web Service Test Designer Now?", as shown in Figure 20.

Figure 20: Web Service Test Design Prompt

Click on "Yes" to open a new "Web Services Test Designer" window. This window contains all the methods in the provided WSDL file in the top left corner. If you want to add other methods or want to remove any methods, just check or uncheck that method, as shown in Figure 21.

Figure 21: Web Service Test Designer Window

I mentioned earlier that WebInspect is a popular black box web services testing tool and here is the reason: It not only imports all the methods from the WSDL but also fills in the values of required data types in the parameter. So, as a pen tester, you just need to provide a valid WSDL to WebInspect and it will do the rest of the things for you, unlike the other tools, where you need to manually insert data in each method. There is one limitation: Sometimes WebInspect is unable to fill in the proper data type in a required parameter and is unable to detect that method. In our case, WebInspect is unable to detect the IsValidUser method, so a red cross is displayed at the right side of that method.

Now close the "Web Services Test Designer" window. It will prompt you to save the designer file. Click on "Yes" and save it by providing a name for your test designer file in your computer. I saved it as test4. And you will get the name auto set in the names field in Detailed Scan Configuration window as shown in Figure 22.

Figure 22: Detailed Scan Configuration Window

You can see other settings in the same window. If you want any customized settings, you can enable them but, in this case, I am proceeding with the default settings. Click on "Next" to complete the wizard, as shown in Figure 23.

Figure 23: Web Services Scan Wizard Final Window

You will get a congratulation message there. Now click on "Scan" to start the scan. WebInspect will scan the web service and provide you with the vulnerability report, as shown in Figure 24.

Figure 24: WebInspect Result

Here the results of the web service scan are displayed. Now you can use WebInspect to test any web service, especially black box, to discover the existing vulnerabilities and you need to verify it manually to avoid false-positives.

Conclusion

Any automated tool will help you to get good results from a penetration testing and will reduce your time and effort, but it's always better to use them just for coverage and focus more on manual testing, because automated tools can provide false positives and false negatives as well.

Reference

http://www-03.ibm.com/software/products/us/en/appscan/

http://www-01.ibm.com/support/docview.wss?uid=swg21404788

http://pic.dhe.ibm.com/infocenter/apsshelp/v8r6m0/index.jsp?topic=%2Fcom.ibm.help.common.infocenter.aps%2Fc_WebApplicationsvsWebServices002.html

http://www8.hp.com/in/en/software-solutions/software.html?compURI=1341991

http://h30499.www3.hp.com/t5/WebInspect/Using-WebInspect-9-10-to-scan-a-web-service/td-p/4817387

What should you learn next?

What should you learn next?

From SOC Analyst to Secure Coder to Security Manager — our team of experts has 12 free training plans to help you hit your goals. Get your free copy now.

http://blog.qatestlab.com/wp-content/uploads/2013/09/software-testing-company-000188.png

Nutan Panda
Nutan Panda

Nutan Kumar Panda is a Security Analyst, with expertise in the field of Web Application and Network Penetration Testing. He is an Infosec and OSINT enthusiast and has been involved into corporate training besides his hobby of Open Vulnerability Disclosure.