Frequently Asked Questions

Can’t find a scan

The scan is there. Just allow yourself to see it.

Written by Victor Pisarciuc
Updated 3 years ago

Stop scan doesn’t work

Never let a frozen scan get in your way! Contact Support right away!

Written by Victor Pisarciuc
Updated 3 years ago

Will the tests overload my server?

Calibrate your expectations the way we calibrated our scanners

Written by Victor Pisarciuc
Updated 3 years ago

How long does a scan take?

Don't endlessly watch the clock while a particular scan is running.

Written by Victor Pisarciuc
Updated 3 years ago

Managing your scans

Scans may be the center of all the other features we offer. Knowing how to handle them is a must.

Written by Victor Pisarciuc
Updated 3 years ago
See all articles (8) Hide articles

Reconnaissance

Can you find all subdomains?

We don't make impossible promises. Unless they are not impossible anymore. It depends on your accessibility level to the DNS server.

Written by Victor Pisarciuc
Updated 4 months ago

Google Hacking isn’t working

Analyzing parameters is the key.

Written by Victor Pisarciuc
Updated 3 years ago

Web Application Testing

How to configure the Website Scanner

Looking for vulnerabilities in your web application? Let Website Scanner do that for you! In this article, we explain all the features and options available to help you make the finest vulnerability reports.

Written by Stefan Bratescu
Updated 4 months ago

What tests are performed by Website Scanner?

The complete list of tests performed by the website vulnerability scanner with details on how each test works.

Written by Stefan Bratescu
Updated 1 year ago

SAST vs DAST

Static Application Security Testing (SAST) vs Dynamic Application Security Testing (DAST)

Written by Victor Pisarciuc
Updated 3 years ago

Target URL is not accessible. Please try a different URL.

Pay attention to URL's, as they might trick you!

Written by Victor Pisarciuc
Updated 2 years ago

Can’t perform authenticated website scan

Authenticated website scanner can fail if you are not using the right method for your specific target login method.

Written by Cristin Sirbu
Updated 4 months ago
See all articles (8) Hide articles

Network Infrastructure Testing

Written by Engineering Team
Updated 1 year ago
Written by Engineering Team
Updated 1 year ago

Scanner didn’t find any open ports

Things are not always what they seem - The host may have open ports, even if the scanner does not see it that way. Expanding the search or whitelisting our scanner IPs might solve the problem.

Written by Robert Tanase
Updated 1 year ago

Which ports are included in the default TCP and UDP port lists?

Our TCP Port Scanner, UDP Port scanner, and Network Vulnerability Scanner let you select between several common port lists, a specific port range, or a custom port list. See here what ports are actually being scanned, depending on which option you select.

Written by Adina Mihaita
Updated 1 year ago

How to set up the Network Scan port range?

Go default, specify the range or provide a list? - You choose.

Written by Robert Tanase
Updated 2 years ago
See all articles (10) Hide articles

Offensive Tools

How to use XSS Exploiter

A fast and easy way to obtain Proof of Concept for your detected XSS.

S
Written by Silvia
Updated 3 years ago

Authenticated Scanning

How to perform Automatic Authentication with Website Scanner

The Automatic Authentication Method allows the user to make an authenticated scan by having a valid pair of credentials in the target application.

Written by Cristin Sirbu
Updated 2 years ago

How to setup Recorded Authentication with Selenium

Recorded or Recording-Based Authentication is a newly added method that can help you when scanning websites with a non-standard authentication.

Written by Cristin Sirbu
Updated 4 months ago

How to perform Cookie Authentication with Website Scanner

The Cookies Authentication Method allows the user to make an authenticated scan by having a valid cookie header in the target application.

Written by Cristin Sirbu
Updated 2 years ago

How to get the Session Cookie

In order to perform an authenticated scan with the Cookies or Headers methods, you will need to obtain the session cookie.

Written by Cristin Sirbu
Updated 2 years ago

How to perform Headers Authentication with Website Scanner

The Headers option allows the user to make an authenticated scan by having valid headers in the target application.

Written by Cristin Sirbu
Updated 2 years ago
See all articles (7) Hide articles