- Why Bright
-
Product
- Resources
- DAST
- Application Security Testing
- Penetration Testing
- Vulnerability Management
Guide to DAST (Dynamic Application Security Testing)
Your primer for application security testing.
We explain the concept of penetration testing.
Comprehensive overview of vulnerability management.
- DevSecOps
- API Security
- Unit Testing
- Fuzzing
All the necessary knowledge to get started with DevSecOps
We take a deeper look into securing & protecting your APIs!
All you need to know about keys of unit testing & best practices.
We explore fuzzing and evaluate if it's the next big thing in cybersec.
-
Company
- Partners
- Contact
How to authorize a host for scanning
Speaker 1: Welcome to Bright. In this video, you’ll learn how to authorize a host for scanning. You’re only able to run scans on trusted or authorized hosts. If you get a warning during a scan setup that hosts are not authorized, don’t worry. And this is easily fixed. To authorize hosts, you can either connect an active repeater for the scan or add a next file to the application root directory. In this video. We’ll demonstrate both these options. Let’s get started. In this example, we’re using a har file for the scan, but the authorization flow is similar for all discovery types. We’ve already uploaded the HA file where several hosts have been flagged as unauthorized. The easiest option to authorize the hosts is to connect an active repeater for the scan, which sends all requests from your network or IP address. An additional benefit for this approach is that the repeater will securely pull all requests from the bright cloud engine to your application as outbound traffic. For instructions on how to create and activate a repeater. See our previous video and docs. Once we select a repeater for the scan, all hosts become authorized automatically. The second option to authorize hosts is to add a next file to the root directory of the application you’re going to scan. This file can be found in and downloaded from your bright organization page as shown. As you can see, we’ve already added the next file to our application directory listing. This next file enables Brite to recognize the application associated with our organization and gives us permission to scan the target directly without the need for a repeater. Once all hosts are authorized with the next file, you can finish the setup and start the scan. Thanks for watching and happy scanning from all of us at Bright.