|Click here for more of Dark Reading's Black Hat articles.|
Thomas and a team at Qualys are also currently conducting an experiment across the Internet with the tool to determine which third-party Web apps -- blogging platforms, content management, or database administration tools, for instance -- are sitting on various websites and posing security risks with outdated or vulnerable versions. He won't reveal any preliminary data, but Thomas says his presentation at Black Hat will feature some surprises about which apps are doing poorly when it comes to version control across the Web. "We'll also do some live demos where we shame some people in the audience who think they are running [secure and up-to-date]" sites, he says.
The BlindElephant tool was named after an ancient Indian fable where several blind men each touch an elephant in order to figure out what it is. One man touches the side of the elephant and declares it's a wall, another its tusk, concluding that it's a spear, etc. "All of them only have one small piece of the picture and are making inferences about it," Thomas says.
Thomas came up with the tool as a way for admins to get a holistic view of their Web apps and discover any apps they didn't know were running, possibly exposing their organizations to security weaknesses, he says. The underlying open-source technology can also be integrated into other tools, such as vulnerability scanners and Web application firewalls (WAFs), he says.
Fingerprinting isn't a new concept. There are existing operating system and Web server fingerprinting methods and tools, he says, but BlindElephant is all about the applications. "There are a couple of other [application fingerprinting] tools that do similar [things] as this tool, but this one is more ... accurate and mature."
It can identify Joomla or WordPress and show if a site is running an outdated or unpatched version of the app, for example. It's basically just a "fire and forget" process: "You point it at a URL and say, 'Tell me if this is a Web app and, if so, what version, what plug-ins it's running," and then it returns that information, Thomas says.
Qualys' Thomas says the goal of the tool is provide "situational awareness," rather than specific vulnerabilities in an application.
Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.