My company has to have an outside firm Pen test all Web-Service 
applications.  So I am spinning up two internal services and both are going 
to be tested around November before they go into Prod from Non-Prod.  I'm 
starting talks with the InfoSec team to see if I can share the findings of 
the test.

On Thursday, October 8, 2015 at 12:13:33 PM UTC-7, Richard wrote:
>
> :)
>
> Nice to heard that!
>
> Richard
>
> On Thu, Oct 8, 2015 at 2:59 PM, Niphlod <nip...@gmail.com <javascript:>> 
> wrote:
>
>> not really. 
>> I built some apps on web2py that are live and in production, and since 
>> EVERY app in my environment NEEDS to pass a Qualys scan to be live and 
>> production ready, I know that MY apps survive a Qualys scan with flying 
>> colors.
>> Point being "ATM web2py does not expose any obvious/hidden threat that 
>> Qualys identifies".
>> I'll reinstate the obvious though: this "just" means that if you code 
>> responsibly, your app is safe. It's not too little of a "just". But it's a 
>> "just" nonetheless. 
>> Noone is saying that EVERY app you code will pass a white-hat attempt if 
>> it's hosted on web2py, and I don't think that any framework in any language 
>> will ever have the guts to assure it. 
>>
>>
>> On Thursday, October 8, 2015 at 8:38:05 PM UTC+2, Richard wrote:
>>>
>>> @Antonio
>>>
>>> I think Simone just point to the tool that can be use for such 
>>> purpose... You can use it over your App. From my understanding the App 
>>> tested is the Ian App...
>>>
>>> Richard
>>>
>>> On Thu, Oct 8, 2015 at 1:19 PM, António Ramos <ramst...@gmail.com> 
>>> wrote:
>>>
>>>> Niphold,
>>>> i dont see where you are pointing on  https://www.qualys.com/
>>>> where is the web2py app that survived the security scan ?
>>>>
>>>> thank you
>>>>
>>>> 2015-10-05 11:25 GMT+01:00 Niphlod <nip...@gmail.com>:
>>>>
>>>>> here in ***undisclosed company**** web2py survives a 
>>>>> https://www.qualys.com/ security scan with no reports whatsoever.
>>>>>
>>>>>
>>>>> On Sunday, October 4, 2015 at 2:47:44 PM UTC+2, Ian Ryder wrote:
>>>>>>
>>>>>> Hi, just looking back over anything about penetration testing and 
>>>>>> web2py - does anyone know of any recent (or any at all) testing of 
>>>>>> web2py? 
>>>>>> We're getting close to our first customers on an app we've been 
>>>>>> developing 
>>>>>> the last year so really need to try and pick it to pieces now while we 
>>>>>> have 
>>>>>> a few months to work on anything we need to.
>>>>>>
>>>>>> Thanks
>>>>>> Ian
>>>>>>
>>>>>> On Tuesday, 10 July 2012 19:42:46 UTC+2, Massimo Di Pierro wrote:
>>>>>>>
>>>>>>> Thank you Dave for the feedback. It would be nice to have the 
>>>>>>> results of those  tests (Cenznic, Hailstorm, Quails) published 
>>>>>>> somewhere. 
>>>>>>> Once in a while people ask about this.
>>>>>>>
>>>>>>> Massimo
>>>>>>>
>>>>>>> On Tuesday, 10 July 2012 11:28:39 UTC-5, Dave wrote:
>>>>>>>>
>>>>>>>> Well....
>>>>>>>>
>>>>>>>> I can't say that I have tested the current trunk version, but last 
>>>>>>>> December I ran a pretty exhaustive penetration test against a site 
>>>>>>>> developed web2py.  The results were very good.  No findings above low. 
>>>>>>>>  The 
>>>>>>>> low findings were insignificant.  I ran Cenzic Hailstorm, Qualys and 
>>>>>>>> one 
>>>>>>>> other automated vulnerability test suite (I cant remember which at the 
>>>>>>>> moment) against it without issue.  
>>>>>>>>
>>>>>>>> Here are some things that can cause issue though...
>>>>>>>>
>>>>>>>> * anywhere you use the XML() method in a view you should make sure 
>>>>>>>> you have validation turned on.  Even though the framework is resilient 
>>>>>>>> and 
>>>>>>>> does a good job of sanitizing data in & out, you can still end up in 
>>>>>>>> XSS or 
>>>>>>>> XSRF trouble with XML().
>>>>>>>>
>>>>>>>> * redirects can trip up or slow down a lot of vuln scanners.  Watch 
>>>>>>>> out if you perform your own testing that you're not getting false 
>>>>>>>> negatives.
>>>>>>>>
>>>>>>>> I know some people that would take on a more "formal" assessment if 
>>>>>>>> there is consensus....
>>>>>>>>
>>>>>>>> Dave
>>>>>>>>
>>>>>>>> On Monday, July 9, 2012 11:48:39 AM UTC-4, scausten wrote:
>>>>>>>>>
>>>>>>>>> One of the awesome things about web2py is of course the built-in 
>>>>>>>>> and well-documented resilience against a range of attack methods, but 
>>>>>>>>> I was 
>>>>>>>>> wondering if anyone has attempted a methodical (white-hat) attack to 
>>>>>>>>> probe 
>>>>>>>>> any potential weaknesses?
>>>>>>>>>
>>>>>>>>> Just out of interest :)
>>>>>>>>>
>>>>>>>> -- 
>>>>> Resources:
>>>>> - http://web2py.com
>>>>> - http://web2py.com/book (Documentation)
>>>>> - http://github.com/web2py/web2py (Source code)
>>>>> - https://code.google.com/p/web2py/issues/list (Report Issues)
>>>>> --- 
>>>>> You received this message because you are subscribed to the Google 
>>>>> Groups "web2py-users" group.
>>>>> To unsubscribe from this group and stop receiving emails from it, send 
>>>>> an email to web2py+un...@googlegroups.com.
>>>>> For more options, visit https://groups.google.com/d/optout.
>>>>>
>>>>
>>>> -- 
>>>> Resources:
>>>> - http://web2py.com
>>>> - http://web2py.com/book (Documentation)
>>>> - http://github.com/web2py/web2py (Source code)
>>>> - https://code.google.com/p/web2py/issues/list (Report Issues)
>>>> --- 
>>>> You received this message because you are subscribed to the Google 
>>>> Groups "web2py-users" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send 
>>>> an email to web2py+un...@googlegroups.com.
>>>> For more options, visit https://groups.google.com/d/optout.
>>>>
>>>
>>> -- 
>> Resources:
>> - http://web2py.com
>> - http://web2py.com/book (Documentation)
>> - http://github.com/web2py/web2py (Source code)
>> - https://code.google.com/p/web2py/issues/list (Report Issues)
>> --- 
>> You received this message because you are subscribed to the Google Groups 
>> "web2py-users" group.
>> To unsubscribe from this group and stop receiving emails from it, send an 
>> email to web2py+un...@googlegroups.com <javascript:>.
>> For more options, visit https://groups.google.com/d/optout.
>>
>
>

-- 
Resources:
- http://web2py.com
- http://web2py.com/book (Documentation)
- http://github.com/web2py/web2py (Source code)
- https://code.google.com/p/web2py/issues/list (Report Issues)
--- 
You received this message because you are subscribed to the Google Groups 
"web2py-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to web2py+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to