View Issue Details
|ID||Project||Category||View Status||Date Submitted||Last Update|
|0000121||Kali Linux||[All Projects] Queued Tool Addition||public||2013-03-18 14:16||2021-05-18 11:00|
|Priority||normal||Severity||minor||Reproducibility||have not tried|
|Target Version||Fixed in Version||kali-dev|
|Description||Arachni is an Open Source, feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.|
Arachni is smart, it trains itself by learning from the HTTP responses it receives during the audit process and is able to perform meta-analysis using a number of factors in order to correctly assess the trustworthiness of results and intelligently identify false-positives.
Unlike other scanners, it takes into account the dynamic nature of web applications, can detect changes caused while travelling through the paths of a web application's cyclomatic complexity and is able to adjust itself accordingly.
This way attack/input vectors that would otherwise be undetectable by non-humans are seamlessly handled by Arachni.
Moreover, Arachni yields great performance due to its asynchronous HTTP model (courtesy of Typhoeus) -- especially when combined with a High Performance Grid setup which allows you to combine the resources of multiple nodes for lightning fast scans.
Thus, you'll only be limited by the responsiveness of the server under audit.
Finally, it is versatile enough to cover a great deal of use cases, ranging from a simple command line scanner utility, to a global high performance grid of scanners, to a Ruby library allowing for scripted audits.
|2013-03-18 14:16||saberzaid||New Issue|
|2013-03-21 12:46||muts||Note Added: 0000164|
|2013-03-21 12:46||muts||Status||new => closed|
|2013-03-21 12:46||muts||Assigned To||=> muts|
|2013-03-21 12:46||muts||Resolution||open => fixed|
|2013-03-21 12:46||muts||Status||closed => resolved|
|2021-05-18 10:55||g0tmi1k||Fixed in Version||=> kali-dev|
|2021-05-18 11:00||g0tmi1k||Category||New Tool Requests => Queued Tool Addition|