Go to website
Getting Started (Pentest)
How to run a vulnerability scan on your application
How to verify ownership of an application?
To run a vulnerability scan on your application, you will have to verify that you own the application or domain being scanned. This is required to prevent any unauthorized user to run a scan on your applications & uncover the vulnerabilities. On the My Projects page, click on "Get Started" next to your project name and navigate to the verification step. There are 3 different methods to verify your ownership: DNS Verification File Upload
How to configure the Astra Vulnerability Scanner?
You can configure the Astra Vulnerability Scanner in a few steps using the Scanner Setup workflow. Enter details about your target so that the scanner can login, optimize for your technology and have maximum scan coverage. Open the workflow by clicking on the Set up Scanner on the All Targets page, or from the Settings page for the target.
Should I run a vulnerability scan on Production or Staging environment?
Before you start a vulnerability scan or pentest, it is important to choose the environment you want to target. Choosing between a production or non-production environment is a balance to find between getting the most out of the pentest and reducing the risks. Below is a summary of the pros and cons for each alternative. Production Environment Pros You get a security assessment of the real target, which is available to users and to potential attackers Allows **testing of
How to record a login sequence with Astra Login Recorder Chrome extension
If you have authentication set up on your target, you can configure Astra to scan behind login like an authenticated user. You can Recording a Login Sequence using Astra's Google Chrome Extension, which will be replayed during your scan. Step 1 - Download the Chrome Extension !(https://stor