Web Application Vulnerability Scanner

Frequently Asked Questions

The Web Scanner attempts to discover vulnerabilities in your Web site. It begins by indexing your entire site looking for Web pages,then determines which tests it needs to run based on the type of Web site/pages present.

Please see the following frequently asked questions.


How do I request a scan?

Please note: We prefer you scan test or development servers. The scanner will not impact performance on a production site. However it will attempt to submit data using forms on your site. This may insert unwanted data into your database, or flood you with form generated emails. 

Send email to scanner-admin@iu.edu with the following information

  • The URL you wish to scan.
  • Any additional URLs not linked to the first URL.
  • If the site uses IU login, provide access to username “uisoscan”
  • If the site uses its own login, provide an account (preferably named uisoscan). You may relay the password over Lync (you will be contacted when ready)
  • Indicate if the site is Production or Development. If Production, indicate why you are scanning it rather than a development site. 
  • If the site has forms which generate email, understand that the scanner can produce quite a lot of email by testing those forms.

top


What application is UISO using for Web Scanning?

UISO uses an application by Qualys called Qualys Web Application Scanning (WAS)

top


What does the Web Scanner do?

The application starts by indexing your entire site looking for Web pages. It then determines which tests it needs to run based on the type of Web site/pages present.

top


How long does a scan usually take?

A scan can take anywhere from 10 minutes to 24 hours, depending on the size of the site and how many advanced features the site employs. Generally speaking, the more complicated the site, the longer it will take.

top


From what IP address does my website need to be accessible?

Web scans can originate from any of the following IU IPs

  • 134.68.125.152
  • 10.79.217.1
  • 10.79.217.2
  • 10.79.16.37
  • 10.79.16.38
  • 10.79.72.22
  • 10.79.72.38

Additionally, any public website will most likely be scanned from a remote scanner located in the following block:

  • 64.39.96.0/20

 

top


My application requires a login credential. Is that OK?

Yes. If you are authenticating IU users (either via CAS or LDAP/Kerberos), please ensure you grant access to the username uisoscan (ads\uisoscan).

If your access control is local, please create a local username (preferably named uisoscan) and password/passphrase for the scanner. Passphrases can be sent securely through Lync chat with Jason Abels.

Important: please ensure that you assign the uisoscan user permissions at whatever privilege level you would like the scanner to scan. For instance, if you have an admin interface that you want scanned, uisoscan must be able to access it, as any other user would.

top


Why should I have my Web site scanned?

A better question might be Why wouldn't you want it scanned? What would be the damage if someone broke into your Web site? Is there sensitive data present? Would you be liable under the law? What would happen if your Web site were defaced? What if it were used to distribute illegal content?

System administrators face these sorts of concerns every day. A vulnerability scan doesn't completely eliminate the risks, but better that you're aware of any system flaws first, before an attack