Skip to content Skip to main navigation Skip to footer

Search: scan

109 results

How to use the new Website Scanner

The Website Vulnerability Scanner is a custom tool written by our team which helps you quickly assess the security of a web application. It is a full-blown web application scanner, capable of performing comprehensive security assessments against any type of web application.

Can’t find a scan

To see all your Scans, you should enable the “Show scans for all workspaces” option, under the View Settings dropdown in the top right corner.

What are scan groups?

Learn how to create scan groups so you can easier export aggregated scan results.

Scanner didn’t find any open ports

In order to fix a “no open ports” scan result, you should rescan with Nmap’s option “Don’t ping host (-Pn)” enabled or OpenVAS “Check if host is alive before scanning” option disabled.

Managing your scans

From the /scans page you can view all your finished or ongoing scans, rescan, stop ongoing scans, download scan results or delete scan results.

How do scan templates work?

Learn how to save time by creating and using scan templates which group multiple tools and options within one bundle, in order to launch them all at once.

What are Scheduled Scans?

You can continuously monitor the security of your systems using the platform by scheduling periodic scans.

How to start a scan

You can start a new scan directly from a tool page or from the /targets page by selecting one of the “Scan with…” options.

Download your scan results

You can see all scan results and download or delete scans from the /scans page. You can export the scan results as PDF, HTML, JSON, CSV, XLSX.

How long does a scan take?

Here you can see more information about the duration and important milestones for some of our most commonly used scanners.

Which are the scan limitations?

Each plan has a limitation to how many targets you can scan and how many scans you can run simultaneously.

How to use XSS Exploiter

If you obtained an XSS in your scan results with the Website Scanner or XSS Scanner, you can use the XSS Exploiter to validate the Attack Vector and obtain proof of concept for these findings.

How to get the Session Cookie

You will need to obtain the Session Cookie in order to perform a Cookies Authentication Website Scan.

How to use the SQLi Exploiter tool?

If you obtained a SQL Injection (SQLi) in your scan results with the Website Scanner or SQLi Scanner, you can use the SQLi Exploiter to validate the Attack Vector and obtain proof of concept for these findings. The SQLi Exploiter allows you to confirm SQL Injection vulnerabilities in your site, to see the vulnerable parameters and also to demonstrate the business risk by extracting data from the database.

How to build a pentest robot?

Learn how to combine tool blocks with logic blocks to design the visual penetration testing flow that fits your specific needs.

Target URL is out of scope

URL is out of scope” error can occur if the target URL is incorrect. Check the spelling of the address carefully and look for characters that are not typically present in addresses.

Welcome to!

Find out how platform works, what it can do for your business and what makes it different to other solutions.

How to delete or edit targets

From the /targets page you can delete one or several targets, edit their description or move them to a different workspace.

How to add new targets

You can add new targets either from the targets page, by directly scanning them or from the scan results of discovery tools.

What are Targets and Base Targets?

We count as base targets only the hostname or IP address of the scanned system. All URLs belonging to the same base target will count as a single target.

Try our tools for free

You don’t need an account for the Light version of the tools. Go to the tool page and start scanning your systems for vulnerabilities.

Website is not Accessible

“Website is not Accessible” scan result can occur for several reasons, see here what you can do to fix this.