Continuous Hacking methodology
Description
Fluid Attacks'
Continuous Hacking is a solution that combines its application security testing tools, artificial intelligence (AI), and team of pentesters to accurately find and help remediate security vulnerabilities throughout the software development lifecycle (SDLC) and ensure secure deployments.
Fluid Attacks accurately detects vulnerabilities in continuous cycles that involve the following:
- Automated deterministic attack: Fluid Attacks' automated tool scans your system and reports the common vulnerabilities, showing low false positive rates. The tool performs the following techniques: SAST, DAST, SCA, and CSPM.
- AI-powered triage: Fluid Attacks' AI is specially trained with thousands of snippets of vulnerable code. A dedicated module helps prioritizing potentially vulnerable files for review.
- Attack team: Fluid Attacks' highly certified red team continuously examines code, infrastructure and applications for security vulnerabilities through secure code review, PTaaS and reverse engineering.
- Release team: Fluid Attacks' experts review the findings, discard potential false positives and assess the validity of results.
- Escapes team: Fluid Attacks' experts seek to reduce false negatives by searching even deeper for vulnerabilities.
- Reattack team: Fluid Attacks' experts evaluate the effectiveness of your fixes and whether new vulnerabilities emerged due to the implementation.
Visual depiction of Fluid Attacks' vulnerability detection cycle
Fluid Attacks' support in the vulnerability remediation process is through
custom and automated fixes generated by AI from its platform and
VS Code extension. Additionally, Fluid Attacks' feature called "
Talk to a Pentester" allows you to meet with an expert for help understanding vulnerabilities. Further, Fluid Attacks offers a
CI agent to prevent your development team from deploying software versions with unmanaged vulnerabilities, thus helping to enforce your policies and urge the development team to fix the software security issues.
Needed supplies
- Version control system with Git technology
- Internet access to code repositories, with read and clone privileges (if access is through a private network, its proper configuration and credentials are needed)
- URLs of the environments and/or installers for mobile apps (.apk, .ipa) to test
- Access credentials to every application (for each role to test)
- Access permissions to the integration environment
Ideally, all system credentials should be usable from Linux without human intervention.
Scope
The scope of testing is defined by the active elements within it. Specifically, it is made up of active repositories and mobile environments registered on the platform, excluding those URLs and endpoints expressly excluded by the client. Furthermore, if an unexpected endpoint is identified in the code, the client's authorization is needed to include it within the scope.
Free trial