Verify Ownership
What is Target ownership verification?
To run a vulnerability scan on your application, you must first verify that you own the application or domain being scanned this is called Target Verification.
Why is Target ownership verification required?
This verification is required to prevent unauthorized users from scanning your applications and uncovering vulnerabilities. Application verification before scanning is a crucial security measure. It ensures that only authorized users can initiateFew readersTarget Settings Page
What is the "Target Settings" page?
The Targets settings page is designed to help you manage the configurations of your application's targets, ensuring effective and tailored scanning processes. This page plays a crucial role in managing the settings that directly impact how your targets are scanned and reported.
What Are the Different Target Settings Available?
The Targets settings page offers two main types of configurations:
Target Setup
These settings were initially configured dFew readersConfiguring a Web Target: A Step-by-Step Guide
Introduction
Configuring the Astra Vulnerability Scanner for your web application involves several crucial steps to ensure accurate and comprehensive security assessments. This guide will walk you through each step, from defining the target URL to starting a scan. Proper configuration is key to ensuring the scanner operates effectively and meets your specific security needs.Few readersTargets Page
What is a Target?
A Target refers to a specific application, website, API, or cloud infrastructure that you want to secure through penetration testing or other security assessments. Defining a target involves specifying its type (e.g., Web App, API), providing necessary details like URLs, and configuring it for testing. This helps ensure that the security services are accurately applied to the right assets within your organization.
What is the Targets Page?
The Targets Page serves as theFew readersTarget Setup
Introduction
After purchasing a target, it is essential to verify your ownership of the application or domain. This step ensures that only authorized users can initiate vulnerability scans and penetration tests.
Once you have successfully verified ownership, you can proceed with setting up the target.Few readersConfiguring an iOS/Android Target: A Step-by-Step Guide
Introduction
Configuring your iOS or Android app for a security scan is crucial for identifying vulnerabilities and ensuring the safety of your users. This step-by-step guide will walk you through the process of setting up your mobile app for a comprehensive security assessment. By following these instructions, you’ll provide all necessary information and files needed to conduct a thorough evaluation and secure your application against potential threats.
Access the Scanner Setup
(httpsFew readersCreate the required programmatic keys in Amazon Web Services (AWS)
1. Sign In to the AWS Management Console
2. Accessing IAM in AWS Console
3. Navigate to UserFew readersConfiguring an API Target: A Step-by-Step Guide
Introduction
Setting up Astra’s Vulnerability Scanner for API testing involves a streamlined configuration process that allows the scanner to thoroughly assess your API endpoints. This guide will walk you through each step, from entering the base URL to uploading definition files, ensuring you set up the scanner effectively for your API's security assessment.
Access the Scanner Setup
Navigate to thFew readersConfiguring a Cloud Target: A Step-by-Step Guide
Introduction
Configuring a cloud target for security scanning is essential to ensure the safety and integrity of your cloud infrastructure. This guide will walk you through the process of setting up your cloud environment for a thorough security assessment. By providing accurate information and credentials, you’ll enable the scanner to effectively evaluate your cloud assets and identify potential vulnerabilities.
Access the Scanner Setup
(https://storage.crisp.chat/users/helpdesk/websiFew readersTarget Switcher Help Article
What is a Target Switcher?
The Target Switcher is a powerful feature designed to help you efficiently navigate and manage your workspaces and targets. Whether you're handling different projects, or workspaces, this global selector allows you to filter and view data specific to your selected workspace or target.
The Target Switcher dynamically updates the information displayed on vFew readers