Hello all, I wanted to take a moment to inform you of the new official release format. From now on, it is recommended to use the official Docker Compose based releases, so as to enjoy a well-tested and stable environment for Codename SCNR and Codename RKN. For more information regarding the installation process for each product please consult: Codename SCNR Codename RKN These containers provide a homogeneous environment that runs smoothly on Mac OSX (Intel and Apple Silicon), Linux and MS Windows, allowing you enjoy our products on pretty much any platform supported by Docker. After...
Hello all, Codename SCNR v1.5 and Codename RKN 1.4 have just been released, both now with support for incremental scans. This means that a scan session is maintained and the following workflow is now possible: Run initial/seed scan. Store its session in a file. Run a re-scan, auditing only newly introduced input vectors, i.e. continuing a previous session. Store its session in a file. And so on and so forth. This has the massive advantage of re-scans being immensely quick, as they will only concern themselves with newly introduced input vectors, rather than being full dumb scans again and again....
Hello all, I would like to introduce to you the new addition to Ecsypno's product line: Codename RKN Codename RKN is the first comprehensive WebApp attack surface mapper. It can help save countless hours from your daily duties by providing amazing insight into a web application's behavior and inner workings. It utilizes DAST and client-side IAST techniques to monitor everything about a black-box and presents its I/O characteristics in an approachable form. Codename RKN digs deep and will let you know how to prepare your penetration test approach for each web application based on how it processes its inputs and...
Hello all, I'd like to introduce to you the upcoming addition to Ecsypno's product line: Codename RKN Codename RKN is an automated WebApp I/O behavioral analysis (for reconnaissance and threat modelling) tool -- i.e. a penetration tester's best friend.It is your manual webapp pentest assistant, allowing you to keep track of a Web application's attack surface as well as your progress traversing through it. Core functionality Server-stack identification. Identify amount and types (link, form, cookie etc.) of inputs. Identify input characteristics, ex.: Data sinks -- Data lands in: HTML – reflected HTTP response headers – reflected JS runtime Whether or...