Web Application Vulnerability Scanner
Frequently Asked Questions
The Web Scanner attempts to discover vulnerabilities in your Web site. It begins by indexing your entire site looking for Web pages,then determines which tests it needs to run based on the type of Web site/pages present.
Please see the following frequently asked questions.
- How do I request a scan?
- What application is UISO using for Web Scanning?
- What does the Web Scanner do?
- How long does a scan usually take?
- From what IP address does my website need to be accessible?
- My application requires a login credential. Is that OK?
- Why should I have my Web site scanned?
- Are there any risks associated with running a Web Scan?
- Can I have my Web site added to the Web Scanner?
- Will the Web Scanner submit data to our site?
- Should this scan be run on our production server or a development server?
- What kinds of reports can I get from the Web Scanner?
- How often should I have our Web site scanned?
- Who can help me resolve issues found by the Web Scanner?
- Where can I find more information about 'Web Application Security' and ways to prevent it?
- Any miscellaneous advice you can give?
Please note: We prefer you scan test or development servers. The scanner will not impact performance on a production site. However it will attempt to submit data using forms on your site. This may insert unwanted data into your database, or flood you with form generated emails.
Send email to email@example.com with the following information
- The URL you wish to scan.
- Any additional URLs not linked to the first URL.
- If the site uses IU login, provide access to username “uisoscan”
- If the site uses its own login, provide an account (preferably named uisoscan). You may relay the password over Lync (you will be contacted when ready)
- Indicate if the site is Production or Development. If Production, indicate why you are scanning it rather than a development site.
- If the site has forms which generate email, understand that the scanner can produce quite a lot of email by testing those forms.
UISO uses an application by Qualys called Qualys Web Application Scanning (WAS)
The application starts by indexing your entire site looking for Web pages. It then determines which tests it needs to run based on the type of Web site/pages present.
A scan can take anywhere from 10 minutes to 24 hours, depending on the size of the site and how many advanced features the site employs. Generally speaking, the more complicated the site, the longer it will take.
Web scans can originate from any of the following IU IPs
Additionally, any public website will most likely be scanned from a remote scanner located in the following block:
Yes. If you are authenticating IU users (either via CAS or LDAP/Kerberos), please ensure you grant access to the username uisoscan (ads\uisoscan).
If your access control is local, please create a local username (preferably named uisoscan) and password/passphrase for the scanner. Passphrases can be sent securely through Lync chat with Jason Abels.
Important: please ensure that you assign the uisoscan user permissions at whatever privilege level you would like the scanner to scan. For instance, if you have an admin interface that you want scanned, uisoscan must be able to access it, as any other user would.
A better question might be Why wouldn't you want it scanned? What would be the damage if someone broke into your Web site? Is there sensitive data present? Would you be liable under the law? What would happen if your Web site were defaced? What if it were used to distribute illegal content?
System administrators face these sorts of concerns every day. A vulnerability scan doesn't completely eliminate the risks, but better that you're aware of any system flaws first, before an attack