StackHawk Documentation StackHawk Logo HawkDocs

No results found

Try different keywords or check your spelling

Search documentation

Find guides, API references, and more

esc

Scan Discovery

Scan Discovery is a key feature of HawkScan, essential for finding vulnerabilities in your web application. It navigates and tests various paths within your application to uncover security issues. This page outlines the different methods HawkScan uses for discovery, providing clear configuration examples and links to detailed guides. Our aim is to help you understand and utilize these methods to thoroughly secure your web application.

HawkScan’s spider is designed to discover your application’s routes by analyzing HTML content and following URLs. It is particularly suited for scanning server-side rendered and MVC-shaped web applications.

Example Configuration:

hawk:
  spider:
    base: true # basic spider utility that looks at html source files and follows urls it finds. Enabled by default.

For REST APIs, using the OpenAPI specification enables comprehensive and structured scanning.

Example Configuration:

app:
  openApiConf:
    path: "/openapi.yaml"
hawk:
  spider:
    base: false

HawkScan supports GraphQL APIs, offering a targeted scanning approach for this popular query language.

Example Configuration:

app:
  graphqlConf:
    enabled: true
    schemaPath: /graphql # relative path to the introspection endpoint
    operation: QUERY
    requestMethod: POST
hawk:
  spider:
    base: false

GraphQL scanning in HawkScan enables in-depth testing of GraphQL APIs. By configuring the introspection endpoint (or schema), operation types, and request methods, HawkScan can effectively scan and analyze GraphQL-based services for vulnerabilities, ensuring thorough coverage and efficient scanning.

HawkScan supports gRPC for scanning APIs designed with this framework.

Example Configuration:

app:
  grpcConf:
    path: 'localhost:9001'
hawk:
  spider:
    base: false

For SOAP-based web services, HawkScan provides specialized scanning capabilities.

Example Configuration:

app:
  soapConf:
    path: /ws/features.wsdl # OR...
    filePath: features.xsd
hawk:
  spider:
    base: false

Utilize existing application testing tools to generate web traffic and proxy this into HawkScan for vulnerability analysis.

Supported Custom Scan Discovery methods:

  • cURL
  • Postman
  • Cypress
  • Playwright
  • Selenium

Example Configuration:

hawk:
  spider:
    base: false
    custom:
      command:  "newman run postman_collection.json"

HawkScan can record and read HTTP Archive (HAR) files and follow any included routes that match your app.host. You can optionally replace the host found in all of your HAR file’s routes to match your HawkScan app.host setting.

Example Configuration:

hawk:
  spider:
    base: false
    har:
      file:
        paths:
          - web-session.har

Your privacy settings

We use first and third party cookies to ensure that we give you the best experience on our website and in our products.