Skip to content

Commit bed34fd

Browse files
authored
Merge pull request #8 from ossf/dast
Propose DAST entry
2 parents 6d85437 + a80b7fa commit bed34fd

File tree

2 files changed

+33
-1
lines changed

2 files changed

+33
-1
lines changed

content/en/dast.md

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
---
2+
title: DAST
3+
status: Completed
4+
category: concept
5+
tags: ["fundamental", "acronym", ""]
6+
---
7+
8+
DAST is an acronym for Dynamic Application Security Testing.
9+
10+
There is agreement that DAST executes a program (that is, it uses dynamic analysis instead of static analysis) to find vulnerabilities. However, while the term DAST is often seen in the literature, the *meaning* of DAST has variation in industry.
11+
12+
By some definitions, DAST is dynamic analysis for finding vulnerabilities in (only) web applications (see VeraCode, [*DAST TEST: Benefits of a DAST test for application security*](https://www.veracode.com/security/dast-test), 2020). This makes the term DAST mostly equivalent to the use of *web application scanners*. John Breeden II ([*9 top fuzzing tools: Finding the weirdest application errors*](https://www.csoonline.com/article/3487708/9-top-fuzzing-tools-finding-the-weirdest-application-errors.html), 2019) states this and expressly differentiates DAST from fuzzing.
13+
14+
Others definitions use the term DAST more broadly, where dynamic analysis is used to find vulnerabilities where the "tester has no [necessary] prior knowledge of the system". Under this definition, DAST includes web application scanners, fuzzers, and other dynamic approaches that can be applied to applications. Examples include Thomas Scanlon ([*10 Types of Application Security Testing Tools: When and How to Use Them*](https://insights.sei.cmu.edu/sei_blog/2018/07/10-types-of-application-security-testing-tools-when-and-how-to-use-them.html), 2018) and Sergej Dechand ([*What is FAST?*](https://blog.code-intelligence.com/what-is-fast), 2020) includes web application scanners and fuzzers under “DAST”.
15+
16+
[NIST Special Publication 800-204C](https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204C.pdf)
17+
attempts to split the difference, defining DAST as analyzing
18+
"applications in their dynamic, running state during testing or
19+
operational phases. They simulate attacks against an application
20+
(typically web-enabled applications, services, and APIs), analyze
21+
the application’s reactions, and determine whether it is vulnerable."
22+
23+
Source: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-204C.pdf
24+

wordlist.txt

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -259,4 +259,12 @@ interdependencies
259259
cisa
260260
CVE
261261
CSPM
262-
misconfigurations
262+
misconfigurations
263+
DAST
264+
Breeden
265+
VeraCode
266+
Dechand
267+
Scanlon
268+
Sergej
269+
fuzzers
270+

0 commit comments

Comments
 (0)