Skip to main content

Mittn

Project description

“For that warm and fluffy feeling”

Background

Mittn is an evolving suite of security testing tools to be run in Continuous Integration context. It uses Python and Behave.

The idea is that security people or developers can define a hardening target using a human-readable language, in this case, Gherkin.

The rationale is:

  • Once the initial set of tests is running in test automation, new security test cases can be added based on existing ones without having to understand exactly how the tools are set up and run.

  • Existing functional tests can be reused to drive security tests.

  • Test tools are run automatically in Continuous Integration, catching regression and low-hanging fruit, and helping to concentrate exploratory security testing into areas where it has a better bang-for-buck ratio.

Mittn was originally inspired by Gauntlt (http://gauntlt.org/). You might also want to have a look at BDD-Security (http://www.continuumsecurity.net/bdd-intro.html) that is a pretty awesome system for automating security testing, and offers similar functionality with OWASP Zaproxy.

Installation

Exact installation varies by the test tool you want to use. See the docs/ directory for detailed instructions.

NOTE: Backwards compatibility of false positive databases has been broken. The last version to be compatible with the original database schema is tagged “v0.1” on GitHub.

Features

Currently, the tool implements:

  • Automated web scanning by driving Burp Suite Professional’s Active Scanner, available from http://portswigger.net/. Burp and Burp Suite are trademarks of Portswigger, Ltd. Tested with version 1.6.07.

  • TLS configuration scanning using sslyze, available from https://github.com/nabla-c0d3/sslyze/releases. Requires version 0.12.

  • HTTP API fuzzing (JSON and form submissions) with Radamsa, available from https://github.com/aoh/radamsa. Tested with version 0.4a. (Older versions do not work.)

If you’d like something else to be supported, please open an issue ticket against the GitHub project.

As you can see, all the heavy lifting is done by existing tools. Mittn just glues it together.

Contact information

If you have questions about the usage, please open a ticket in the GitHub project with a “Question” tag.

If you have found a bug, please file a ticket in the GitHub project.

If necessary, you can also email opensource@f-secure.com, but opening a ticket on GitHub is preferable.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

mittn-0.2.0-py2-none-any.whl (38.1 kB view details)

Uploaded Python 2

File details

Details for the file mittn-0.2.0-py2-none-any.whl.

File metadata

File hashes

Hashes for mittn-0.2.0-py2-none-any.whl
Algorithm Hash digest
SHA256 0d71cee989287ceec71bea44e29b505fe86f504052feb97cd474457ffe4447f1
MD5 3db0eb45f5d39b09c9319cb598cf00e5
BLAKE2b-256 37d2e58920c93550bb5fde811556047f1f6eddd2fe497e3ad42dc8d99f578a7f

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page