Frequently Asked Questions

Managing your scans

Scans may be the center of all the other features we offer. Knowing how to handle them is a must.

Written by Victor Pisarciuc
Updated 1 year ago

Which are the scan limitations?

Counting scans shouldn't be a priority for you. Instead, keep an eye on the parallel scans.

Written by Victor Pisarciuc
Updated 1 year ago

How long does a scan take?

Don't endlessly watch the clock while a particular scan is running.

Written by Victor Pisarciuc
Updated 9 months ago

Website is not Accessible

Accessibility suits websites best.

Written by Victor Pisarciuc
Updated 8 months ago

Can’t find a scan

The scan is there. Just allow yourself to see it.

Written by Victor Pisarciuc
Updated 1 year ago
See all articles (9) Hide articles

Reconnaissance

Can you find all subdomains?

We don't make impossible promises. Unless they are not impossible anymore. It depends on your accessibility level to the DNS server.

Written by Victor Pisarciuc
Updated 11 months ago

Google Hacking isn’t working

Analyzing parameters is the key.

Written by Victor Pisarciuc
Updated 11 months ago

Web Application Testing

SAST vs DAST

Static Application Security Testing (SAST) vs Dynamic Application Security Testing (DAST)

Written by Victor Pisarciuc
Updated 11 months ago

How to configure the Website Scanner

Looking for vulnerabilities in your web application? Let Website Scanner do that for you! In this article, we explain all the features and options available to help you make the finest vulnerability reports.

Written by Stefan Bratescu
Updated 4 months ago

What tests are performed by Website Scanner?

The complete list of tests performed by the website vulnerability scanner with details on how each test works.

Written by Stefan Bratescu
Updated 4 months ago

Target URL is out of scope

How to fix the error: Target URL redirects to … which is out of scope. Please scan this URL directly.

Written by Victor Pisarciuc
Updated 5 months ago

Target URL is not accessible. Please try a different URL.

Pay attention to URL's, as they might trick you!

Written by Victor Pisarciuc
Updated 5 months ago
See all articles (8) Hide articles

Network Infrastructure Testing

How to Perform Internal Network Scanning

Learn how to scan hosts from your internal network using a VPN connection to reach the internal networks.

Written by Cosmin Tudor
Updated 5 months ago

How do we determine if a host is alive?

One important aspect of any network scanning process is to ensure that its desired assets are first of all active before performing any further actions such as port scanning or vulnerability assessment.

Written by Robert Tanase
Updated 4 months ago

Scanner didn’t find any open ports

Things are not always what they seem - The host may have open ports, even if the scanner does not see it that way. Expanding the search or whitelisting our scanner IPs might solve the problem.

Written by Robert Tanase
Updated 5 months ago

How to set up the Network Scan port range?

Go default, specify the range or provide a list? - You choose.

Written by Robert Tanase
Updated 5 months ago

Which ports are included in the default TCP and UDP port lists?

Our port scanners let you select between several common port lists, a specific port range, or a custom port list. See here what ports are actually being scanned, depending on which option you select.

Written by Adina Mihaita
Updated 3 months ago
See all articles (6) Hide articles

Offensive Tools

How to use XSS Exploiter

A fast and easy way to obtain Proof of Concept for your detected XSS.

Written by Silvia Balan
Updated 11 months ago

Authenticated Scanning

How to perform Automatic Authentication with Website Scanner

The Automatic Authentication Method allows the user to make an authenticated scan by having a valid pair of credentials in the target application.

Written by Cristin Sirbu
Updated 5 months ago

How to setup Recorded Authentication with Selenium

Recorded or Recording-Based Authentication is a newly added method that can help you when scanning websites with a non-standard authentication.

Written by Cristin Sirbu
Updated 5 months ago

How to perform Cookie Authentication with Website Scanner

The Cookies Authentication Method allows the user to make an authenticated scan by having a valid cookie header in the target application.

Written by Cristin Sirbu
Updated 5 months ago

How to get the Session Cookie

In order to perform an authenticated scan with the Cookies or Headers methods, you will need to obtain the session cookie.

Written by Cristin Sirbu
Updated 5 months ago

How to perform Headers Authentication with Website Scanner

The Headers option allows the user to make an authenticated scan by having valid headers in the target application.

Written by Cristin Sirbu
Updated 5 months ago
See all articles (7) Hide articles