Vulnerability scans, automated for any business

ZAP Advanced sScan Page

Scan Progress...

KairoFind's Basic Scan Details

KairoFind provides two kinds of OWASP security scans to meet the needs of our users. The Basic Scan which is free, uses the OWASP ZAP (Zaproxy) scanner, a leading open-source project used by many large players in the security industry. These scans test websites and web apps for OWASP Top 10 risks and more and these are Passive Scans.

The Passive Scan loads the pages of a website and checks for vulnerabilities such as cross-domain misconfigurations, insecure cookies, and vulnerable js dependencies (see table below for full list). This scan completes within several minutes.

The Advance Scan is a platform where our users provide information about their web applications, code, or their infrastructure and submit their requests. KairoFind receives these requests and based on the need, uses a combination of open-source and commercial tools to test the websites, code, or the infrastructure and provides the report within 48 hours.

The Advance Scan submits forms and makes requests to the web application to test for vulnerabilities such as SQL injection, remote command execution, and cross-site scripting (see table below for full list). The advanced scan is not destructive, but it may send thousands of requests to a web application while thoroughly testing for all vulnerabilities. This scan may take up to several hours, depending on the scanned target.

Scan Capability Passive Scan Active Scan
Application Error Disclosure
Big Redirect Detected (Potential Sensitive Information Leak)
Charset Mismatch
Content-Type Header Missing
Cookie No HttpOnly Flag
Cookie Poisoning
Cookie Without Secure Flag
Cross-Domain JavaScript Source File Inclusion
Cross-Domain Misconfiguration
Directory Browsing
HTTP Server Response Header
HTTP to HTTPS Insecure Transition in Form Post
HTTPS to HTTP Insecure Transition in Form Post
Hash Disclosure
Heartbleed OpenSSL Vulnerability (Indicative)
Information Disclosure - Debug Error Messages
Information Disclosure - Sensitive Information in HTTP Referrer Header
Information Disclosure - Sensitive Information in URL
Information Disclosure - Suspicious Comments
Insecure JSF ViewState
Loosely Scoped Cookie
Modern Web Application
Open Redirect
PII Disclosure
Private IP Disclosure
Re-examine Cache-control Directives
Retrieved from Cache
Reverse Tabnabbing
Script Passive Scan Rules
Secure Pages Include Mixed Content
Session ID in URL Rewrite
Stats Passive Scan Rule
Strict-Transport-Security Header
Timestamp Disclosure
User Controllable Charset
User Controllable HTML Element Attribute (Potential XSS)
User Controllable JavaScript Event (XSS)
Username Hash Found
Verification Request Identified
Viewstate
Vulnerable JS Library (Powered by Retire.js)
WSDL File Detection
Weak Authentication Method
X-AspNet-Version Response Header
X-Backend-Server Header Information Leak
X-ChromeLogger-Data (XCOLD) Header Information Leak
X-Debug-Token Information Leak
.env Information Leak
.htaccess Information Leak
Directory Browsing (Active mode only)
CRLF Injection
Cross Site Scripting (Persistent)
Cross Site Scripting (Persistent) - Prime
Cross Site Scripting (Persistent) - Spider
Cross Site Scripting (Reflected)
ELMAH Information Leak
External Redirect
GET for POST
Generic Padding Oracle
Heartbleed OpenSSL Vulnerability
Log4Shell
Parameter Tampering
Path Traversal
Remote Code Execution - CVE-2012-1823
Remote File Inclusion
Remote OS Command Injection
SQL Injection
SQL Injection - MsSQL
SQL Injection - MySQL
SQL Injection - Oracle
SQL Injection - PostgreSQL
Script Active Scan Rules
Server Side Code Injection
Server Side Template Injection
Server Side Template Injection (Blind)
Source Code Disclosure - /WEB-INF folder
Source Code Disclosure - CVE-2012-1823
Spring Actuator Information Leak
Spring4Shell
Trace.axd Information Leak
XML External Entity Attack
XPath Injection
XSLT Injection

footer-page