K2 finds exploitable vulnerabilities in applications by leveraging their normal use cases. A proof of exploit and location of the exploit are provided.
Exploit Detection with K2 Platform
In this section, we outline the steps for exploit detection using the K2 Platform.
Step 1 : K2 Portal and Account Creation
In order to use K2 Platform You need to create an account on K2 Portal.
K2 Portal can be used as SaaS model or you can deploy entire portal on your On-Premises.
K2 Platform is offered as SaaS software and can be used directly visiting SaaS portal i.e. https://k2io.net or if you are an AWS customer then you can buy subscription to K2 SaaS portal on AWS Marketplace.
K2 Platform is also offered as On-Premises based solution and can be deployed directory on your local infrastructure or if you are an AWS customer then you can subscribe to K2Cloud AMI and deploy K2 On-Premises portal on AWS.
Step 1 : In order to enable dynamic scanning, You have to install Agents in IAST mode and enable dynamic scanning.
Confirm from protected applications that you are using IAST group.
Step 2 : Login to K2 portal to confirm if dynamic scanning is enabled or not.
To enable Enable dynamic scanning which will help us eventually detect exploits automatically, Go to Policy Tab and subsequently Web Applications sub page.
Click on Edit/Show policy at the right side on your preferred policy.