Get Started with Threatspy
We have devloped Threatspy for Developers & Security Engineers to efficiently detecting, prioritizing, and remediating security vulnerabilities in web applications and APIs. By using Threatspy, you can easily enhance the security of your applications and APIs, and we're thrilled that you've chosen to give it a go. We've put together a comprehensive guide that will help you get the most out of Threatspy and safeguard your applications and APIs.
Follow the steps below to get started:
Run Your First Scan
Follow this guide to get up and running with threatspyscan, the easiest way to scan your applications & API directly from dashboard. We will begin with adding the assets.
Steps
- Add Assets: Point your Domain/IP to establish the ownership for your Digital Assets.
- Verify Assets: Validate the ownership through any of the method ( DNS/ META/FILE)
- Add Scan Profile: Add Scan Scope and Credentials after selecting one of the application Type.
Type: Web Application
- Give scan profile name in ScanProfilename
- Select the Credential Type in CredentialType from None/Authorization Header/Cookies.
- To perform Authenticated scan provide Authorization header/Cookies value with name in respective fields.
Type: API
- In API Defination: Upload the Swagger/Open API File.
- Give scan profile name in ScanProfilename
- Select the Credential Type in CredentialType from Authorization Token/Cookies.
- Pass the Token/Cookie Name and Value in respective Fields.
- Lets Get Started: Reconfirm the details entered in above steps and Submit.
Start Scan
From All Assets tabs select the type of scan out of Light and Deep and click on start scan button to begin the same.