Authenticated Web Application Vulnerability Scan
Scan behind the login of websites and web apps
Scan behind the login of websites and web apps
An authenticated vulnerability scan logs in to the target web application. This allows the scan to cover sections of the application that are accessible only to logged in users. For many web applications, a significant amount of the content is behind a log in and an authenticated scan is required for a thorough security test.
You can authenticate using two methods:
With HostedScan Security you can easily run authenticated OWASP ZAP scans using a recorded login for your web application. HostedScan uses the recorded login to authenticate into your application and scan behind the login.
Follow the steps below to configure your authentication and run scans.
HostedScan uses Selenium recordings to capture and replay the login steps for a website. Selenium is a widely used open-source tool for recording and automating actions on a web page.
.side
file.HostedScan uses Selenium recordings to capture and replay the login steps for a website. Selenium is a widely used open-source tool for recording and automating actions on a web page.
https://mysite.com/logout
. It is important to configure these URLs so that the scanner does not visit them and unauthenticate during the scan.On the Targets menu click the New Scan button.
The scan may take a couple minutes to start as it goes through the authentication process.
HostedScan enables companies to meet compliance and security goals.