Support Center
Go to Pentest-Tools.com
Submit a ticket
Tools and Scans
Getting started
First Steps
Tips & Tricks
Tools and Scans
Network Infrastructure Testing
Authenticated Scanning
Web Application Testing
Offensive Tools
Reconnaissance
Frequently Asked Questions (FAQ)
Reporting and Vulnerability Management
Reporting
Notifications
Findings
Attack Surface
Automation
Scan Templates
Pentest Robots
Scheduler
Integrations
VPN Profiles
Assets, Targets & Workspaces
Assets & Targets
Workspaces
Account and Billing
Account Management
Billing and Payment
Data Security
Change Log
Back to home
Support Center
Tools and Scans
Getting started
First Steps
Tips & Tricks
Tools and Scans
Network Infrastructure Testing
Authenticated Scanning
Web Application Testing
Offensive Tools
Reconnaissance
Frequently Asked Questions (FAQ)
Reporting and Vulnerability Management
Reporting
Notifications
Findings
Attack Surface
Automation
Scan Templates
Pentest Robots
Scheduler
Integrations
VPN Profiles
Assets, Targets & Workspaces
Assets & Targets
Workspaces
Account and Billing
Account Management
Billing and Payment
Data Security
Change Log
Tools and Scans
Network Infrastructure Testing
How do we determine if a host is alive?
Which ports are included in the default TCP and UDP port lists?
Scanner didn’t find any open ports
How to configure the Port Scanner
How to scan a subnet or IP range
How to set up the Network Scan port range?
How to Perform Internal Network Scanning
How to configure the Network Vulnerability Scanner
Nuclei templates used in Network Vulnerability Scanner
See more
Authenticated Scanning
How to perform Automatic Authentication with Website Scanner
How to perform Authenticated Website Scan with JWT
How to run Sniper authenticated scans
How to get the Session Cookie
How to perform Headers Authentication with Website Scanner
How to perform Cookie Authentication with Website Scanner
How to setup Recorded Authentication with Selenium
See more
Web Application Testing
How to configure the Website Scanner
Target URL is out of scope
What tests are performed by Website Scanner?
SAST vs DAST
Can all OWASP Top 10 Web Application Security Risks be detected by automatic scanners?
Risks in performing a deep website scan
Can’t perform authenticated website scan
Target URL is not accessible. Please try a different URL.
See more
Offensive Tools
How to use XSS Exploiter
How to use the SQLi Exploiter tool?
Reconnaissance
Can you find all subdomains?
Google Hacking isn’t working
Frequently Asked Questions (FAQ)
Can’t find a scan
Website is not Accessible
Will the tests overload my server?
How long does a scan take?
Stop scan doesn’t work
How we detect Log4Shell & find vulnerable Log4j versions
What are deprecated tools on Pentest-Tools.com?
Managing your scans
Which are the scan limitations?
Interpreting scan statuses
See more