How can we help you today?

Frequently Asked Questions

Managing your scans

Scans may be the center of all the other features we offer. Knowing how to handle them is a must.

Written by Victor Pisarciuc
Updated 2 months ago

Which are the scan limitations?

Counting scans shouldn't be a priority for you. Instead, keep an eye on the parallel scans.

Written by Victor Pisarciuc
Updated 2 months ago

How long does a scan take?

Don't endlessly watch the clock while a particular scan is running.

Written by Victor Pisarciuc
Updated 2 months ago

Website is not Accessible

Accessibility suits websites best.

Written by Victor Pisarciuc
Updated 1 week ago

Can’t find a scan

The scan is there. Just allow yourself to see it.

Written by Victor Pisarciuc
Updated 2 months ago
See all articles (8) Hide articles

Reconnaissance

Google Hacking isn’t working

Analyzing parameters is the key.

Written by Victor Pisarciuc
Updated 1 month ago

Can you find all subdomains?

We don't make impossible promises. Unless they are not impossible anymore. It depends on your accessibility level to the DNS server.

Written by Victor Pisarciuc
Updated 1 month ago

Web Application Testing

SAST vs DAST

Static Application Security Testing (SAST) vs Dynamic Application Security Testing (DAST)

Written by Victor Pisarciuc
Updated 1 month ago

How to configure the Website Scanner

Looking for vulnerabilities in your web application? Let Website Scanner do that for you! In this article we explain all the features and options available to help you make the finest vulnerability reports.

Written by Silvia Balan
Updated 1 month ago

What tests are performed by Website Scanner?

The complete list of tests performed by the website vulnerability scanner with details on how each test works.

Written by Silvia Balan
Updated 1 month ago

Target URL is out of scope

How to fix the error: Target URL redirects to … which is out of scope. Please scan this URL directly.

Written by Victor Pisarciuc
Updated 1 month ago

Target URL is not accessible. Please try a different URL.

Pay attention to URL's, as they might trick you!

Written by Victor Pisarciuc
Updated 2 weeks ago
See all articles (14) Hide articles

Network Infrastructure Testing

How to set up the Network Scan OpenVAS port range?

Go default, specify the range or provide a list? - You choose.

Written by Victor Pisarciuc
Updated 1 month ago

Scanner didn’t find any open ports

Things are not always what they seem - The host may not be down, even if the scanner sees it that way

Written by Victor Pisarciuc
Updated 1 month ago

Which ports are included in the default TCP and UDP port lists?

Our port scanners let you select between several common port lists, a specific port range, or a custom port list. See here what ports are actually being scanned, depending on which option you select.

Written by Adina Mihaita
Updated 1 month ago

How to scan a subnet or IP range

Each IP in a range or CIDR will be considered as a separate target

Written by Victor Pisarciuc
Updated 1 month ago

Offensive Tools

How to use the SQLi Exploiter tool?

A fast and easy way to obtain Proof of Concept for your detected SQLi’s

Written by Silvia Balan
Updated 1 month ago

How to use XSS Exploiter

A fast and easy way to obtain Proof of Concept for your detected XSS.

Written by Silvia Balan
Updated 1 month ago