DongTai IAST
is an open-source passive interactive security testing (IAST) product. It uses dynamic hooks and taint tracking algorithms to achieve universal vulnerability detection and multiples request associated with vulnerability detection (including but not limited to unauthorized vulnerabilities, overpower vulnerabilities), Third-party component vulnerability detection, etc. Currently, applications in Java and Python are supported for vulnerability detection.
.
├── deploy
├── dongtai_common common functions and classes for each service to call
├── dongtai_conf configuration files
├── dongtai_engine vulnerability detection and vulnerability processing part
├── dongtai_protocol protocols for interaction between dongtai-server and agent
├── dongtai_web api for interacting with the web
├── static static files
└── test testcases
DongTai IAST
has multiple basic services, including DongTai-web
, DongTai-webapi
, DongTai-openapi
, DongTai-engine
, agent
, DongTai-deploy
, DongTai-Base-Image
and DongTai-Plugin-IDEA
:
DongTai-web
is the product page of DongTai, which is used to handle the interaction between users and cave states.DongTai-webapi
is responsible for handling user-related operations.DongTai-openapi
is used to process the registration/heartbeat/call method/third-party component/error log data reported by agent
, issue hook strategy, issue probe control commands, etc.DongTai-engine
analyzes whether there are vulnerabilities in HTTP/HTTPS/RPC requests according to the calling method data and taint tracking algorithm, and is also responsible for other related timing tasks.agent
is a probe module of DongTai, including data collection terminals in different programming languages, used to collect data during application runtime and report to the DongTai-OpenAPI
service.DongTai-deploy
is used for the deployment of DongTai IAST, including docker-compose single-node deployment, Kubernetes cluster deployment, etc. If you want a deployment plan, you can add features or contribute to the deployment plan.DongTai-Base-Image
contains the basic services that DongTai depends on runtime, including MySql, Redis.DongTai-Plugin-IDEA
is the IDEA plug-in corresponding to the Java probe. You can run the Java probe directly through the plug-in and detect the vulnerabilities directly in IDEA.The usage scenarios of “DongTai IAST” include but not limited to:
DevSecOps
process to realize automatic detection of application vulnerabilities/third-party component combing/third-party component vulnerability detection.DongTai IAST
supports SaaS Service and Localized Deployment. Please refer to Deployment Document for localized deployment.
DongTai IAST
supports a variety of deployment schemes which refer to Deployment Document:
git clone git@github.com:HXSecurity/DongTai.git
cd DongTai
chmod u+x build_with_docker_compose.sh
./build_with_docker_compose.sh
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…