Go to website
Getting Started (Pentest)
How to run a vulnerability scan on your application
How to configure the Astra Vulnerability Scanner?
You can configure the Astra Vulnerability Scanner in a few steps using the Scanner Setup workflow. Enter details about your target so that the scanner can login, optimize for your technology and have maximum scan coverage. Open the workflow by clicking on the Set up Scanner on the All Targets page, or from the Settings page for the target.
How to verify ownership of an application?
To run a vulnerability scan on your application, you will have to verify that you own the application or domain being scanned. This is required to prevent any unauthorized user to run a scan on your applications & uncover the vulnerabilities. On the My Projects page, click on "Get Started" next to your project name and navigate to the verification step. There are 3 different methods to verify your ownership: DNS Verification File Upload
Should I run a vulnerability scan on Production or Staging environment?
Before you start a vulnerability scan or pentest, it is important to choose the environment you want to target. Choosing between a production or non-production environment is a balance to find between getting the most out of the pentest and reducing the risks. Below is a summary of the pros and cons for each alternative. Production Environment Pros You get a security assessment of the real target, which is available to users and to potential attackers Allows **testing of
How to record a login sequence with Astra Login Recorder Chrome extension
If you have authentication set up on your target, you can configure Astra to scan behind login like an authenticated user. You can Recording a Login Sequence using Astra's Google Chrome Extension, which will be replayed during your scan. Step 1 - Download the Chrome Extension !(https://stor
How to fix Scan Behind Login errors?
If you have configured the Scan Behind Login feature but the login recording is giving errors, it could be because of the following reasons listed below: Login page is protected by a Captcha CAPTCHA solutions are designed to stop automated systems, and only allow human beings. It is often seen that these block automated vulnerability scanners. Solution 1: Disable the captcha verification If