Scan Preferences
Scan jobs can be configured with the optional "preferences" object. If no "preferences" object is passed to a scanning job the default parameters are used.
scan_type
Parameter type: string
Users can choose between two scan types, "full" or "lite" scans. Lite scans fewer less features but are completed much faster than "full" scans. To view the full list of features for each scan type please visit: Scan Features
full
default
lite
sqli
Parameter value: sqli
Parameter type: boolean
Activates SQL Injection vulnerability detection task. This task is disabled by default so as to not cause overload on production environments
false (default)
Disables SQL Injection vulnerability detection
true
Enables SQL Injection vulnerability detection
xss
Parameter value: xss
Parameter type: boolean
Activates XSS vulnerability detection task. This task is disabled by default so as to not cause overload in production environments
false (default)
Disables XSS vulnerability detection
true
Enables XSS vulnerability detection
crawler_options
Parameter type: JSON
Specifies which tasks will be executed by VScanner's crawler
exposed_emails
Returns discovered emails found while crawling
Default: True
open_redirect
Discovers open redirect vulnerabilities
Default: True
exposed_apikeys
Returns discovered API Keys found while crawling
Default: True
open_directory
Discovers open directories while crawling
Default: False
exposed_information
Returns files and configurations found while crawling, such as .env files
Default: False
backdoor_detection
Discovers backdoors that may be present while crawling, such as malicious php files left by hackers
Default: False
search_url_malware
Discovers URLs used by known malicious Javascript scripts
Default: False
Important Note:
Please note that enabling options that are disabled by default in the crawler might lead to a significant increase in requests to the target endpoint. Be mindful that setting these options to 'True' can generate a high volume of requests.
An example of a JSON that enables all crawler options:
cms_brute_force
Parameter type: integer
integer Initiates a brute force attack on identified CMS systems such, as WordPress.
0 (default)
Disables CMS brute force
1
Enables CMS brute force
web_brute_force
Parameter type: integer
Initiates brute force attacks on Basic access HTTP authentication
0 (default)
Disables Basic auth brute force
1
Enables Basic auth brute force
scan_speed
Parameter type: string
Determines the speed of the crawler.
"sequencial"
1
1
10
"slow"
2
3
80
"moderate"
5
5
40
"fast"
10
10
150
scan_deep
Parameter type: integer
Indicates the crawl depth used by the scanner.
Default value: 3
search_in_web_cache
Parameter type: boolean
Indicate whether VScanner should scan for the target's web pages that are cached but not currently indexed on the live site. Due to the large number of web pages included in the scan, it will naturally take longer to complete.
false (default)
Disables searching in cached pages
frue
Enables searching in cached pages
leak_data_usage
Parameter type: integer
If enabled, VScanner will check whether any discovered emails are listed in data breach databases.
0 (default)
Disables searching in cached pages
1
Enables searching in cached pages
crawler_options
The crawler_options
object configures specific checks for the vulnerability scan, including options to detect exposed emails, API keys, open redirects, and more. It allows fine-tuning of the crawler's behavior to focus on relevant security aspects.
Parameter type: Object
open_directory
Boolean
Determines whether the crawler checks for open directories on the target.
exposed_information
Boolean
Indicates if the crawler should search for exposed sensitive information such as server configurations or hidden files.
backdoor_detection
Boolean
Specifies whether the crawler looks for potential backdoor vulnerabilities on the target
exposed_emails
Boolean
Determines if the crawler scans for exposed email addresses on the target.
search_url_malware
Boolean
Indicates whether the crawler checks for malware hosted in URLs on the target.
open_redirect
Boolean
Specifies if the crawler should test for open redirect vulnerabilities.
exposed_apikeys
Boolean
Determines if the crawler scans for exposed API keys in the target system.
Last updated