Linchakin

DongTai - An Interactive Application Security testing(IAST) Product That Supports The Detection Of OWASP WEB TOP 10 Vulnerabilities, Multi-Request Rel...

 September 26, 2021     No comments   

中文版本(Chinese version)


About DongTai IAST

DongTai IAST is an open-source passive interactive security testing (IAST) product. It uses dynamic hooks and taint tracking algorithms to achieve universal vulnerability detection and multiples request associated with vulnerability detection (including but not limited to unauthorized vulnerabilities, overpower vulnerabilities), Third-party component vulnerability detection, etc. Currently, applications in Java and Python are supported for vulnerability detection.

Architecture

DongTai IAST has multiple basic services, including DongTai-web, DongTai-webapi, DongTai-openapi, DongTai-engine, agent, DongTai-deploy, DongTai-Base-Image and DongTai-Plugin-IDEA:

  • DongTai-web is the product page of DongTai, which is used to handle the interaction between users and cave states.
  • DongTai-webapi is responsible for handling user-related operations.
  • DongTai-openapi is used to process the registration/heartbeat/call method/third-party component/error log data reported by agent, issue hook strategy, issue probe control commands, etc.
  • DongTai-engine analyzes whether there are vulnerabilities in HTTP/HTTPS/RPC requests according to the calling method data and taint tracking algorithm, and is also responsible for other related timing tasks.
  • agent is a probe module of DongTai, including data collection terminals in different programming languages, used to collect data during application runtime and report to the DongTai-OpenAPI service.
  • DongTai-deploy is used for the deployment of DongTai IAST, including docker-compose single-node deployment, Kubernetes cluster deployment, etc. If you want a deployment plan, you can add features or contribute to the deployment plan.
  • DongTai-Base-Image contains the basic services that DongTai depends on runtime, including MySql, Redis.
  • DongTai-Plugin-IDEA is the IDEA plug-in corresponding to the Java probe. You can run the Java probe directly through the plug-in and detect the vulnerabilities directly in IDEA.

Scenario

The usage scenarios of "DongTai IAST" include but not limited to:

  • Embed the DevSecOps process to realize automatic detection of application vulnerabilities/third-party component combing/third-party component vulnerability detection.
  • Common vulnerability mining for open source software/open source components.
  • Security testing before release, etc.

Quick start

DongTai IAST supports SaaS Service and Localized Deployment. Please refer to Deployment Document for localized deployment.


1. SaaS Version

2. Localized Deployment Version [Open Source for Jointly Partnership]

Please follow the instructions bellow to apply the localized deployment version

DongTai IAST supports a variety of deployment schemes which refer to Deployment Document:

  • Stand-alone Deployment
  • Cluster Deployment

Docker-compose
$ git clone [email protected]:HXSecurity/DongTai.git
$ cd DongTai
$ chmod u+x build_with_docker_compose.sh
$ ./build_with_docker_compose.sh

How To Apply

DongTai IAST Jointly Partnership Program, registration address


Contributing

Contributions are welcomed and greatly appreciated. Further reading — CONTRIBUTING.md for details on submitting patches and contribution workflow.

Any questions? Let's discuss in #DongTai discussions


Futher Resources

Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • $1 Trillion Infrastructure Bill is the Catalyst for DOT-Impersonated Phishing Attacks Targeting ContractorsOffering targeted victim organizations an opportunity to bid on infrastructure projects, this scam seeks to harvest credentials using a new mix of tac… Read More
  • Get an EVGA Mouse With 16,000 DPI for Under $30ByJason England At Newegg, the EVGA X17 gaming mouse is now just $29.99 after a huge $50 price cut — th...EVGA accessories have been lighting up our deals coverage lately. But the company hasn’t stopped at huge gaming keyboard discounts, as its ergonomic g… Read More
  • Metal Raspberry Pi Arcade Controller is as Cool as it is ShinyByAsh Hill JamHamster is at it again with this gorgeous all-in-one Raspberry Pi arcade j...Maker JamHamster is well known for crafting beautiful Raspberry Pi projects with bright orange highlights and metallic finishes. Today we’ve got anoth… Read More
  • Far Cry 6 Proves Consoles Aren't Powerful Enough for Ray TracingByJarred Walton Ubisoft is right to make the Far Cry 6 ray tracing effects run on PCs ... WCCFTech recently interviewed the lead programmer for Far Cry 6, discussing some of the graphical upgrades we'll see when the game launches on Octobe… Read More
  • This optical illusion is so mind-bending that no one believes itByAmelia Bamsey optical illusionWhat can you see?Another day, another optical illusion that we can't understand. This time we are sitting scratching our heads at this image of three seemingly differe… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates