Frequently Asked Questions

Can’t find a scan

The scan is there. Just allow yourself to see it.

Written by Victor Pisarciuc
Updated 1 year ago

Stop scan doesn’t work

Never let a frozen scan get in your way! Contact Support right away!

Written by Victor Pisarciuc
Updated 1 year ago

Which are the scan limitations?

Counting scans shouldn't be a priority for you. Instead, keep an eye on the parallel scans.

Written by Victor Pisarciuc
Updated 1 year ago

Will the tests overload my server?

Calibrate your expectations the way we calibrated our scanners

Written by Victor Pisarciuc
Updated 1 year ago

How long does a scan take?

Don't endlessly watch the clock while a particular scan is running.

Written by Victor Pisarciuc
Updated 11 months ago
See all articles (9) Hide articles

Reconnaissance

Can you find all subdomains?

We don't make impossible promises. Unless they are not impossible anymore. It depends on your accessibility level to the DNS server.

Written by Victor Pisarciuc
Updated 1 year ago

Google Hacking isn’t working

Analyzing parameters is the key.

Written by Victor Pisarciuc
Updated 1 year ago

Web Application Testing

How to configure the Website Scanner

Looking for vulnerabilities in your web application? Let Website Scanner do that for you! In this article, we explain all the features and options available to help you make the finest vulnerability reports.

Written by Stefan Bratescu
Updated 6 months ago

What tests are performed by Website Scanner?

The complete list of tests performed by the website vulnerability scanner with details on how each test works.

Written by Stefan Bratescu
Updated 6 months ago

SAST vs DAST

Static Application Security Testing (SAST) vs Dynamic Application Security Testing (DAST)

Written by Victor Pisarciuc
Updated 1 year ago

Target URL is not accessible. Please try a different URL.

Pay attention to URL's, as they might trick you!

Written by Victor Pisarciuc
Updated 7 months ago

Can’t perform authenticated website scan

Authenticated website scanner can fail if you are not using the right method for your specific target login method.

Written by Cristin Sirbu
Updated 7 months ago
See all articles (8) Hide articles

Network Infrastructure Testing

Scanner didn’t find any open ports

Things are not always what they seem - The host may have open ports, even if the scanner does not see it that way. Expanding the search or whitelisting our scanner IPs might solve the problem.

Written by Robert Tanase
Updated 7 months ago

Which ports are included in the default TCP and UDP port lists?

Our port scanners let you select between several common port lists, a specific port range, or a custom port list. See here what ports are actually being scanned, depending on which option you select.

Written by Adina Mihaita
Updated 5 months ago

How to set up the Network Scan port range?

Go default, specify the range or provide a list? - You choose.

Written by Robert Tanase
Updated 7 months ago

How to scan a subnet or IP range

Each IP in a range or CIDR will be considered as a separate target

Written by Robert Tanase
Updated 7 months ago

How to Perform Internal Network Scanning

Learn how to scan hosts from your internal network using a VPN connection to reach the internal networks.

Written by Cosmin Tudor
Updated 7 months ago
See all articles (6) Hide articles

Offensive Tools

How to use XSS Exploiter

A fast and easy way to obtain Proof of Concept for your detected XSS.

Written by Silvia Balan
Updated 1 year ago

Authenticated Scanning

How to perform Headers Authentication with Website Scanner

The Headers option allows the user to make an authenticated scan by having valid headers in the target application.

Written by Cristin Sirbu
Updated 7 months ago

How to setup Recorded Authentication with Selenium

Recorded or Recording-Based Authentication is a newly added method that can help you when scanning websites with a non-standard authentication.

Written by Cristin Sirbu
Updated 7 months ago

How to perform Authenticated Website Scan with JWT

You can do this by using the custom HTTP headers authentication method

Written by Cristin Sirbu
Updated 7 months ago

How to run Sniper authenticated scans

Sniper authenticated scans provide an easy and efficient way to quickly obtain information from a system in terms of Sniper Artefacts. Learn how to use this new Sniper feature in this short guide.

Written by Adina Mihaita
Updated 7 months ago

How to perform Automatic Authentication with Website Scanner

The Automatic Authentication Method allows the user to make an authenticated scan by having a valid pair of credentials in the target application.

Written by Cristin Sirbu
Updated 7 months ago
See all articles (7) Hide articles