This resource is no longer available
Typically, DAST involves running a scanner to test how an application behaves in response to aggressive stimuli. The scanner is capable of sending attack payloads and checking the server responses.
Most security organizations use vulnerability scanners and other DAST tools. However, most of the scanners that are deployed today are limited in their coverage.
In this white paper, learn about 3 important areas a scanner must address when conducting scans to ensure full coverage, including:
- Which payloads to send
- Where to send the payloads
- And more