Pentest Defense Score — AISeen Docs
Як AISeen симулює перевірки пентестера: CORS, rate limiting, розкриття сервера, SQL помилки, відкриті шляхи та WAF.
What we check
Checks if Access-Control-Allow-Origin is set to wildcard (*) or reflects arbitrary origins. A misconfigured CORS policy lets malicious sites make authenticated requests on behalf of your users.
Tests if the server returns HTTP 429 Too Many Requests or enforces any rate limit. Without rate limiting, attackers can brute-force login pages, APIs, and admin panels.
Checks Server, X-Powered-By, and X-AspNet-Version headers for version numbers. Disclosing exact versions helps attackers find and exploit known CVEs quickly.
Sends a probe with a SQL injection character (') and checks if the response contains database error messages. Even partial SQL errors confirm injection vulnerabilities and reveal DB structure.
Probes common high-risk URLs: /.git, /.env, /wp-admin, /phpmyadmin, /admin, /backup.zip, /backup.sql, /config.php, /.htaccess, /database.sql. Any accessible path can expose credentials or source code.
Checks for /.well-known/security.txt — the standard file where you disclose how to report security vulnerabilities. Its absence is a minor signal that security is not a priority.
Paths we probe
We send a GET request to each path. HTTP 200 or 403 (vs 404) indicates the path is accessible or recognized.
/.git/Full source code exposureCritical/.envAPI keys, DB credentials, secretsCritical/backup.zipComplete site archiveCritical/backup.sqlDatabase dump with all dataCritical/config.phpDatabase credentialsCritical/wp-admin/WordPress admin panel exposedHigh/phpmyadmin/Database admin panelHigh/admin/Admin panel discoveryHigh/.htaccessServer config exposureHigh/database.sqlDatabase dumpCriticalWAF Detection
We detect if a Web Application Firewall (WAF) is in front of your site. A WAF provides an additional layer of protection and reduces the effective deduction of some pentest findings by -10 points (your vulnerabilities are partially mitigated).
Cloudflare
cf-ray header, __cfduid cookie, CF-Cache-Status
Vercel
x-vercel-id header, vercel Edge Network banner
Akamai
akamai-origin-hop header, AkamaiGHost in Server
AWS WAF / CloudFront
x-amz-cf-id header, Via: 1.1 CloudFront
Fastly
Fastly-Request-ID header, X-Fastly-Request-ID
Sucuri
X-Sucuri-ID header, server: Sucuri/Cloudproxy
How scoring works
Score starts at 100. Each vulnerability found deducts points. If a WAF is detected, an additional -10 bonus reduction is applied to total deductions (reflecting partial mitigation).
Score ranges
80 – 100
Hardened
No obvious pentest entry points. A real attacker would need significant effort. Keep monitoring for new exposures.
50 – 79
Exposed
Some recon-phase vulnerabilities present. Fix CORS, rate limiting, and server disclosure before launch.
0 – 49
Critical Risk
Multiple critical vulnerabilities found. Sensitive files may be exposed. Immediate remediation required.
Pentest Defense Score — AISeen Docs
Як AISeen симулює перевірки пентестера: CORS, rate limiting, розкриття сервера, SQL помилки, відкриті шляхи та WAF.