Qualys Brings Web Application Scanning to Next Level of Automation

Qualys, Inc.

Last updated on: September 6, 2020

Qualys today announced a new release of QualysGuard Web Application Scanning (WAS) 2.1 that integrates with Selenium to help companies further automate scanning of web applications with complex authentication.

One of the challenges of dynamic application security testing (DAST) is the ability to successfully authenticate the application during a scan. QualysGuard WAS 2.1 uniquely addresses this challenge with support for Selenium scripts, which expands the ability of WAS 2.1 to perform authenticated web application scans and identify vulnerabilities. The Selenium plug-in (http://seleniumhq.org/projects/ide/) enables users to record their browser actions and save them as scripts that can then be replayed at a later time. Through its use of Selenium, WAS 2.1 can effectively scan web applications that require complex authentication with multi-step login processes.

In addition to Selenium support, QualysGuard WAS 2.1 provides key features including:

  • Client Certificate Support: WAS 2.1 expands its reach with support for client SSL certificates that are required by many high-risk web applications. This update will provide users with the ability to upload client SSL certificate files which will then be used by WAS to perform authenticated scanning, expanding the scanning coverage and increasing the number of web application vulnerabilities identified.
  • Post Data Black List: With Post Data Black Lists, users can identify pages for which forms should not be submitted. This prevents the potential impact of posting the forms but allows the page view to be evaluated for security vulnerabilities, increasing the coverage while lowering the risk of scanning impact on the application.
  • Additional URL Support: WAS 2.1 expands coverage by enabling users to enter a list of links to be scanned that may not be linked to the initial URL.

Read the full announcement.

Share your Comments


Your email address will not be published. Required fields are marked *