Scans
Scan your Web Applications to discover external vulnerabilities.
The complexity of today’s applications, combined with the constant evolution of cyber threats, makes it increasingly difficult to ensure security measures. Traditional methods of security assessment often fall short of providing continuous insights, leading to potential blind spots.
Scans address these challenges head-on. By combining the power of PtaaS with DAST, you gain a comprehensive solution for continuously assessing risk.
The beta period runs until December 31, 2023. During the beta, you have access to three scans a month, allowing you to fully explore this new feature. Scans reset on the first of the month. Anticipate usage and limitation adjustments in 2024.
To access the Scans Beta you must be an org owner or org member. Staff org members can also access this section to be able to better provide support.
We use the following IP Address to make requests to your target: 52.19.40.38
How to Use Scans
- To add a target, select the plus button
- Add a name for the target and the URL
- To add authentication toggle on the “Authenticated Scan” option
- Follow the Steps to add authentication details
- Login form URL
- Add fields (You will likely have one field for username and one for password)
- Field Name
- Field Value
- NOTE: Currently, the Scans tool only supports login form authentication.
- Follow the Steps to add authentication details
- To run a scan, select “Start Scan”
-
You have two options to View Results
- You can view the results on the target
- Or, navigate to scans and view results for individual scans by clicking on the Started Date.
-
Generate Report
-
From Targets, select the target you want to view a report for
-
Select “View Report”
You’ll then see a PDF report with the scan report findings.
-
-
Move Finding State
- You can update the state for each finding
- Each finding has the following states:
- Pending Fix (default): A vulnerability was found in a scan and has not been remediated
- Declined: This is a false positive and not relevant to your application (Each of these gets reviewed internally by Cobalt)
- Accepted Risk: This is a known vulnerability but due to a mitigating control, the user accepts the risk.
- Re-test: The user has remediated the vulnerability and is ready to retest the finding. Submitting a retest is the only way to mark a vulnerability as “fixed”.
-
Retest Finding
- You can retest individual findings.
- Navigate to the finding you want to retest and select “retest”
- If the scan engine does not find the vulnerability again it will automatically mark the finding as “Fixed”. If the issue still persists, it will move back to its previous state.
How to Contact Support
For support, please reach out to your CSM or email us at dast@cobalt.io.
Last modified December.12.2023