Web Security

Reconnaissance, vulnerability scanning, headers, SSL/TLS, auth, and API testing.

Overview

Diverg's web security capabilities cover infrastructure discovery, vulnerability detection, and configuration analysis. They follow established methodologies (OWASP, PTES) and produce structured findings with severity and evidence. All of this runs in the same workflow as blockchain and OSINT, so you get one correlated view.

Reconnaissance

Before diving into vulnerabilities, Diverg maps the target:

  • Port scanning: Open ports with service detection and banner grabbing; nmap is used where available for depth.
  • Subdomain enumeration: DNS brute force and certificate transparency logs to find subdomains and related hosts.
  • Technology fingerprinting: Wappalyzer-style detection of frameworks, servers, and versions so later tests can be tailored.

Vulnerability scanning

Automated checks for common web issues, with proof-of-concept where possible:

  • Cross-site scripting (XSS), SQL injection (SQLi), CSRF, directory traversal
  • Misconfigurations (debug endpoints, default credentials, exposed backups)
  • OWASP Top 10 and other common CWE patterns

Findings include severity, affected URL/parameter, and evidence (e.g. request/response or snippet).

Security headers & SSL/TLS

Analysis of HTTP security headers (CSP, HSTS, X-Frame-Options, etc.) and TLS configuration (certificate validity, cipher suites, protocol versions). Surfaces missing or weak settings that could lead to downgrade or injection risks.

Authentication & API testing

When the target has login or APIs, Diverg can test:

  • Session management, cookie flags (HttpOnly, Secure, SameSite), and user enumeration
  • API endpoint discovery, CORS behavior, auth bypass, and IDOR-style access issues

See Skills System for how these fit into the overall skill set, and Reporting for how findings are structured.