Extend processor is a process to be performed after sending a request to the scanning target.
In this process, the message ID specified in the Extend processor settings will be accessed to evaluate after the scanning request is sent to the scanning target message ID, but a payload is not sent to the message ID specified by the Extend processor settings.
If Post processor is set together with Extend processor, Extend processor is processed before Post processor runs.
Extend processor Handler is mainly used for the following purposes.
· Detection of the vulnerabilities against second order attacks
As well as Extend processor, Post processor is also processed after sending a request to the scanning target, but the difference between them is whether or not it carries out scanning.
Post processor just access to the message ID, but doesn’t make scan results evaluation. On the other hand, Extend processor evaluates scan results in addition to accessing the message ID.
In the above diagram, the "Reference screen" comes after the scanning target page ("Completion screen"), but the data reading /writing is processed on the database of the scanning target server on that background.
Extend processor Handler is to be set between the scanning target and the "Reference screen". When accessing the "Reference page", it evaluates whether the vulnerability management has been working even for the data retrieved from the database.