Skip to main content
Version: v6

Scan Profiles


Overview

Haltdos Scanner supports multiple scan profiles per target application. A user can create a scan profile and use that to run multiple scans on target applications. The scan profile defines the scope of the security scan, authentication parameters for performing scanning as authenticated user and connection related settings to not overwhelm targeted applications.

A scan profile consists of the following specifications:

Scan Scope

PARAMETERDESCRIPTION
Scope to HTTPSSpecify if only HTTPs links to scan
Scope Directory Depth LimitSpecify the depth of Scan
Scope Include Sub-DomainsSpecify if sub-domains are also included in the scan
Scope Exclude BinariesSpecify if binary files are excluded in the scan
Scope Page LimitSpecify the number of unique pages to scan
Scope Dom Depth LimitSpecify how deep to go into the DOM tree of each page, for pages with JavaScript code
Scope Excluded Content PatternsExcludes pages whose content matches any of the given patterns
Scope Excluded Path PatternsExcludes crawling and auditing URLs which match the given patterns
Scope Included Path PatternsOnly crawls and audits URLs matching the given patterns
Scope Restrict PathUses the given paths instead of crawling.
Scope Extend PathUses the provided list of paths to extend the scope of the crawl

Scan Auth

PARAMETERDESCRIPTION
Enter UrlThe URL that contains the login form (URL).
Input field name for the username fieldName of the username input field
UsernameLogin username of your login module
Input field name for the password fieldName of your Password input field
PasswordLogin password of your login module
Enter Login CheckFor example, if a logout link only appears when a user is logged in then it can be a perfect choice.

Scan Audit

PARAMETERDESCRIPTION
Audit FormsEnable to evaluate forms during scanning
Audit LinksEnable Audit links
Audit UI FormsEvaluate UI forms during scanning
Audit UI InputAudit orphan input elements with associated DOM events
Audit CookiesEvaluate cookies during scanning
Audit HeadersEvaluate headers during scanning
Audit JSONEnable Audit JSON inputs
Audit XMLsEnable Audit XML inputs
Audit With Both HTTP methodsAudit elements with both GET and POST requests
Audit Cookies ExtensivelySubmits all links and forms of the page along with the cookie permutations
Audit Include Vector PatternOnly includes input vectors (parameters) whose name matches the given patterns in the audit.
Audit Exclude Vector PatternExcludes input vectors(parameters)whose name matches the given patterns from the audit
Audit Link TemplatesRegular expression with named captures to use to extract input information from generic paths.
Add Form KeyForm key
Add Form ValueForm value

Connection Settings

PARAMETERDESCRIPTION
Request Redirect LimitLimits the amount of total redirects to be followed.
Request ConcurrencyAmount of requests to be active at any given time.
Request Queue SizeMaximum amount of HTTP requests to keep in the queue
Request TimeoutSpecify request timeout value
Response Max SizeSpecify max response size to be evaluated
Add Cookie ValueSpecify list of cookies to be specified during scan
Add Header ValueSpecify list of headers to be included during scan

Fingerprinting

Optimize Scan by restricting the scope to the technologies used by the target application

PARAMETERDESCRIPTION
Operating SystemSpecify the list of operating systems of Origin Servers
DatabaseSpecify the list of databases used by target application
Web ServersSpecify the list of web servers used by target application
Web FrameworksSpecify the list of web frameworks (if any) used by target application
Programming LanguagesSpecify the list of programming languages used by target application

Scan Types

Specify the types of scans to run. The scans can be of two types:

  1. Active Scan
  2. Passive Scan

Active Scans

Active Scan checks the following vulnerabilities during the scan

  • Code Injections
  • CSRF
  • File Inclusions
  • LDAP Inclusions
  • No SQL Injection
  • OS Command Injection
  • Path Traversal
  • Response Splitting
  • Source Code Disclosure
  • SQL Injection
  • Unvalidated Redirect
  • XSS
  • XML

Passive Scans

Passive Scan checks the following vulnerabilities during the scan

  • Check HTTP Methods
  • Check for Backdoor
  • Check File Directories
  • Check Admin Interfaces
  • Check Files
  • Check Cookies
  • Check for information disclosure
  • Check HTML issues
  • Check CORS security
  • Check Input forms
  • Check Code Repository issues
  • Check Access Policy
  • Check HTTP Header security (HSTS policy)
  • Check HTTP Response for miscellaneous disclosures