Scan Types in Tenable Web App Scanning
Scan types in Tenable Web App Scanning scans are available to help you quickly start your scans with the appropriate level of options.
Did You Know? Scanning: 65% of WAS customers prefer to run a Quick Scan.
Scan Type Coverage Details
Scan Type / Duration | Description | Prerequisite | Settings based on default Scan Template | Selected Plugins |
---|---|---|---|---|
Quick scan
Three minutes or less |
This scan focuses on configuration issues related to SSL/TLS and HTTP security headers. The web application is not crawled. | DOM Exploration disabled Unauthenticated No crawling |
Not applicable as there is no crawling. | HTTP Security Header
All SSL/TLS All |
Basic Scan
Under an hour |
This scan focuses on misconfigurations and component vulnerabilities, but the generic vulnerabilities (RCE, XSS, SQLi, etc.) are not tested. | DOM Exploration disabled Unauthenticated |
Assessment
Scan Type: Custom Elements to Audit: Links: true Headers: false Parameter Names: false JSON Elements: true UI Forms: false Cookies: false Forms: true Parameter Values: true XML Elements: true UI Inputs: false Advanced Target Scan Max Time:01:00:00 Number of URLs to Crawl and Browse: 100 Path Directory Depth: 5 Page DOM Element Depth: 3 Slow down the scan when network congestion is detected Disabled |
Authentication & Session
Only: Basic Authentication Detected Basic Authentication Without HTTPS Access Restriction Bypass Via Origin Spoof Unencrypted Password Form Password Field With Auto-Complete Exposed Session Token Weak Session Management Detected Component Vulnerability All Data Exposure All HTTP Security Header All SSL/TLS All Web Applications All except: PHP Object Deserialization Java Object Deserialization Python Object Deserialization Server-Side Request Forgery Path Traversal Response Splitting Client Side Prototype Pollution Web Cache Poisoning Web Cache Deception Unvalidated Redirect DOM Unvalidated Redirect HTTP Parameter Pollution Web Servers All |
Standard Scan
A few hours |
This scan focuses on misconfigurations, component vulnerabilities, and common generic vulnerabilities (RCE, XSS, SQLi, etc.). Uncommon and blind vulnerabilities are not covered. | DOM Exploration disabled Unauthenticated |
Assessment
Scan Type: Custom Elements to Audit: Links: true Headers: false Parameter Names: false JSON Elements: true UI Forms: false Cookies: false Forms: true Parameter Values: true XML Elements: true UI Inputs: false Advanced Target Scan Max Time:03:00:00 Number of URLs to Crawl and Browse: 400 Path Directory Depth: 5 Page DOM Element Depth: 3 Slow down the scan when network congestion is detected Disabled |
Authentication & Session
Only: Basic Authentication Detected Basic Authentication Without HTTPS Access Restriction Bypass Via Origin Spoof Unencrypted Password Form Password Field With Auto-Complete Exposed Session Token Weak Session Management Detected Code Execution Code Injection Code Injection PHP Input Wrapper Operating System Command Injection Component Vulnerability All Cross Site Request Forgery All Cross Site Scripting Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) in HTML tag Cross-Site Scripting (XSS) in attribute context Cross-Site Scripting (XSS) in path Cross-Site Scripting (XSS) in event tag of HTML element Cross-Site Scripting (XSS) in script src XSSI Dot Net XSS Cross-Site Scripting (XSS) Stored Data Exposure All File Inclusion All HTTP Security Header All Injection XML External Entity XPath Injection SQL Injection NoSQL Injection LDAP Injection Host Header Injection Server-Side Template Injection Client-Side Template Injection Content Injection Expression Language Injection JSONP Injection Server Side Include Injection SSL/TLS All Web Applications All except PHP Object Deserialization Java Object Deserialization Python Object Deserialization Web Servers All |
Custom Scan
Variable |
Maximum possible level of scan coverage. | DOM Exploration enabled Authentication available |
Assessment
Scan Type: Assessment: Extensive Credentials Bruteforcing: Enabled Advanced Target Scan Max Time: 99:00:00 |
All Plugins |
Note: Each scan type (and scan template) supports families of plugins and individual plugins. For more information, see View Your Scan Plugins.