Ethical Considerations. During the realization of
this work, we don’t upload any payloads to the target
real-world web applications. We only submit queries
and observe the returned value. Our aim is to eval-
uate whether SCWAD can be used in practices and
avoid poisoning the real-world web applications. We
unveil a TID vulnerability in the Crazygames applica-
tion. We have shared this unveiling with the applica-
tion owner, explaining our experiments are designed
for scientific research only.
5 CONCLUSION
In this study, we have introduced SCWAD, an auto-
mated web application pentesting framework. Cen-
tral to our approach is the structured and quantifi-
able representation of a target web application’s el-
ements, referred to as the knowledge base in this con-
text. The introduction of the knowledge base con-
cept brings forth significant advantages. Firstly, it
enables the pentest process to be modeled as a se-
quential decision-making problem. SCWAD incor-
porates an automated pentest agent that selects vi-
able vulnerability exploration actions based on the at-
tributes defined in the knowledge base. Additionally,
the pentest agent within SCWAD can enhance the un-
derstanding of the target web application by updating
attribute values in the knowledge base, thereby guid-
ing subsequent vulnerability exploration actions. Sec-
ondly, the design of the knowledge base allows vul-
nerabilities to be encoded as logic expressions involv-
ing the attributes of the knowledge base. This feature
facilitates interaction between the automated pentest
agent and human oracles; the agent can assess po-
tential vulnerabilities’ feasibility by matching knowl-
edge base attributes with encoded logic expressions
representing vulnerability signatures. Looking ahead,
our future research aims to integrate reinforcement
learning-based agents, enhancing adaptability and ef-
ficiency in vulnerability exploration. The pentest
policies learned through interactions with diverse web
applications can empower human security analysts
to uncover novel vulnerability exploitation methods.
This knowledge, in turn, can inform proactive mea-
sures for strengthening the security posture of target
web applications.
REFERENCES
Ginandjuice.shop. https://ginandjuice.shop.
Buyukkayhan, A. S., Gemicioglu, C., Lauinger, T., Oprea,
A., Robertson, W., and Kirda, E. (2020). What’s in an
exploit? an empirical analysis of reflected server XSS
exploitation techniques. In RAID 2020.
Dahse, J. and Holz, T. (2014). Simulation of built-in php
features for precise static code analysis. In NDSS
2014.
Doup
´
e, A., Cavedon, L., Kruegel, C., and Vigna, G. (2012).
Enemy of the state: A state-aware black-box web vul-
nerability scanner. In USENIX Security.
Doup
´
e, A., Cova, M., and Vigna, G. (2010). Why johnny
can’t pentest: An analysis of black-box web vulnera-
bility scanners. In Detection of Intrusions and Mal-
ware, and Vulnerability Assessment, pages 111–131.
Drakonakis, K., Ioannidis, S., and Polakis, J. (2023). Res-
can: A middleware framework for realistic and robust
black-box web application scanning. In NDSS.
DVWA (2023). Damn vulnerable web application.
https://github.com/digininja/DVWA.
Eriksson, B., Pellegrino, G., and Sabelfeld, A. (2021).
Black widow: Blackbox data-driven web scanning. In
IEEE S&P 2021.
Jovanovic, N., Kruegel, C., and Kirda, E. (2006). Pixy: a
static analysis tool for detecting web application vul-
nerabilities. In IEEE S&P 2006.
Kals, S., Kirda, E., Kruegel, C., and Jovanovic, N. Secu-
bat: A web vulnerability scanner. In World Wide Web
Conference.
Microsoft (2024). Playwright.
Nashaat, M., Ali, K., and Miller, J. (2017). Detecting secu-
rity vulnerabilities in object-oriented php programs. In
SCAM 2017.
Nunes, P., Medeiros, I., Fonseca, J. C., Neves, N., Correia,
M., and Vieira, M. (2018). Benchmarking static anal-
ysis tools for web security. IEEE Transactions on Re-
liability.
Nunes, P. J. C., Fonseca, J., and Vieira, M. (2015). php-
SAFE: A Security Analysis Tool for OOP Web Appli-
cation Plugins. In DSN 2015.
OWASP (2021). Open source foundation for application
security top 10 - 2021. https://owasp.org/Top10/.
OWASP (2023a). Owasp.
https://cheatsheetseries.owasp.org/cheatsheets/XSS
Filter Evasion Cheat Sheet.html.
OWASP (2023b). Zed attack proxy (zap).
https://www.zaproxy.org/.
Pellegrino, G., Tsch
¨
urtz, C., Bodden, E., and Rossow, C.
(2015). J
¨
Ak: Using dynamic analysis to crawl and
test modern web applications. In RAID 2015.
PortSwigger (2023). Burp suite’s web vulnerability scanner.
https://portswigger.net/burp/vulnerability-scanner.
RootMe (2023). Root me. https://www.root-me.org.
Surribas, N. (2023). Wapiti. https://wapiti-
scanner.github.io/.
Talon, N., Viet Triem Tong, V., Guette, G., and Han, Y.
(2023). Uvvu. https://github.com/scwaduvvu/uvvu.
Zhang, B., Li, J., Ren, J., and Huang, G. (2022). Efficiency
and Effectiveness of Web Application Vulnerability
Detection Approaches. ACM Computing Surveys.
SCWAD: Automated Pentesting of Web Applications
433