STEWS is a tool suite for security testing of WebSockets
This research was first presented at OWASP Global AppSec US 2021
STEWS provides the ability to:
- Discover: find WebSockets endpoints on the web by testing a list of domains
- Fingerprint: determine what WebSockets server is running on the endpoint
- Vulnerability Detection: test whether the WebSockets server is vulnerable to a known WebSockets vulnerability
The included whitepaper in this repository provides further details of the research undertaken. The included slide deck was presented at OWASP AppSec US 2021.
Complementary respositories created as part of this research include:
Installation & Usage
Each portion of STEWS (discovery, fingerprinting, vulnerability detection) has separate instructions. Please see the README in each respective folder.
See the discovery README
See the fingerprinting README
WebSocket Vulnerability Detection
See the vulnerability detection README
Why this tool?
WebSocket servers have been largely ignored in security circles. This is partially due to three hurdles that have not been clearly addressed for WebSocket endpoints:
- Vulnerability detecting
STEWS attempts to address these three points. A custom tool was required because there is a distinct lack of support for manually configured WebSocket testing in current security testing tools:
- There is a general lack of supported and scriptable WebSocket security testing tools (for example, NCC’s unsupported wssip tool, nuclei’s lack of WebSocket support, and nmap’s lack of WebSocket support)
- Burp Suite lacks support for WebSocket extensions (for example, see this PortSwigger forum thread and this one).
- There is a lack of deeper WebSocket-specific security research (the Awesome WebSocket Security repository lists published WebSockets security research)
- The proliferation of WebSockets around the modern web (as seen in the results of the STEWS discovery tool)