Create a Custom Test
Overview
You can write custom probes using Akto and automate running them in your CI/CD for agentic security testing.
Step 1: Select your vulnerable agent component
Let's start writing our custom probes. We will look at a scenario to illustrate how easily we can transform it into an Akto Probe YAML Template. Let's take an example scenario -
Exploit Possible DOS attack by Pagination Misconfiguration
Check if there is any param, which can be modified to get more data from the server. Here is an example agent component from a vulnerable app on which we will build our probe.
We notice that there is a limit query param being passed with value = 10. We can try to exploit this parameter through our probe.
Step 2: Approach YAML Probe Syntax
We need to think of three sections before writing the probe:
Filter your components:We can add a filter to only run the probe on agent component endpoints that contain the limit keyword in the query parameters. This can be accomplished using either thecontains_eitherorregexkeywords.Modify Request:During probe execution, if the "limit" keyword is found, we should increase its value. We aim for a 10x increase from the original value.Validate Response:After sending the probe request, we need to validate if the agent component is actually vulnerable. One way to do this is to check if the response payload is larger than the original payload length.
Step 3: Write Component Selection Filters
api_selection_filters:
query_param:
for_one:
key:
regex: .*limit.*
extract: limitKey
value:
extract: limitValue
response_payload:
length:
extract: original_lengthWe begin with the
queryparamfilter, which places acondition on the key. The collection operand "for_one" specifies that only one key needs to match the condition inside it, which in this case is the regular expression (.limit.). Therefore, any key containing the word "limit" will be matched.The
extractoperator retrieves the matched value from the previous condition and assigns it to a variable called "limitKey" (i.e. limitKey = the name of the matched key, in this case, "limit").We then
extractthevaluepresent inside the "limit" key, which in the above example is 10. This value is stored in the "limitValue" variable, which will be required in the executor section below.Finally, we
extractthelengthof the sample response payload and store it in a variable called "original_length."
Step 4: Write Execute
Here, we use the operator
modify_query_paramto update the value of the limit. We provide the key (limitKey) and the value (limitValue).limitKeyresolves to the key name "limit", which was extracted in the API selection filters above.limitValueresolves to 10. We append an additional 0 to modify its value to 100.The new test URL will now look something like this.
GET http://localhost:8000/api/articles?limit=100&offset=0
Step 5: Write Validate
To avoid failed response codes, we added validation that checks if the response code is greater than or equal to 200 and less than 300. The
andoperator ensures that bothgteandltoperators are satisfied.We also check if the length of the probe response is greater than the length of the original sample response body. In the
Component Selection Filterssection above, we extracted theoriginal_lengthvariable.
You can set the name and id of the probe as My Probe on DOS attack by Pagination. You can now click on the Save button to save this probe.
All blocks combined -
Last updated