September 29, 2015 By Shane Schick 2 min read

System administrators can never be sure of where the next online attack will come from, which is why Yahoo has released a Web application security scanner that could help automate the process of inspecting and detecting potentially problematic URLs.

In a page posted to the open-source code repository GitHub, Yahoo offered details on how organizations can freely use what it describes as a large-scale Web application security scanner, dubbed Gryffin. Available via a BSD-style license, Gryffin will allow admins to look at a wide range of their Web applications, from publicly facing things like load balancers of Web servers or mail gateways to corporate sales and procurement applications. The tool could spot vulnerabilities that leave such applications open to cross-site scripting attacks or SQL injections, among other dangers.

As The Hacker News reported, Gryffin is Yahoo’s attempt to demonstrate some leadership in the security scanner space by addressing the problem of looking at hundreds of thousands of URLs. It also performs functions called crawling, which refers to looking at the entirety of a Web app, and fuzzing, which involves examining and testing various parts of the app.

Though other firms have offered a Web application security scanner before, Yahoo’s focus on this area reflects its ongoing interest in technical areas that later attract mainstream interest, Softpedia News said. For example, Yahoo’s early involvement in Hadoop paved the way for how big data is tackled by many organizations. Similarly, Gryffin could become a common way for companies to proactively defend themselves against major security risks.

The Register took a closer look at the GitHub document and suggested that Yahoo may not only be providing the bare bones of a security scanner, but also a product that contains some of the company’s own code at some point. For now, the beta version of Gryffin includes a combination of Go and JavaScript, requiring prospective users to make use of sqlmap, Kibana, Elastic Research and the NSQ distributed messaging system, among other things.

According to Infosecurity Magazine, choosing a Web application security scanner comes down to a combination of how simple it is to use, the coverage it provides and the complexity of an organization’s website. It may take some time to see whether Yahoo’s Gryffin meets these expectations, but it’s there for anyone to try.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today