Guidance
Guidance documentation for XBOW Console.
Articles in this section
-
Learn which targets are most suited to XBOW penetration testing.
-
Learn about the different XBOW assessment types available.
-
Learn how to configure an assessment for full testing at the same time as protecting your application and users.
-
Learn what files to include to give XBOW insight into your application.
-
Learn what happens during XBOW's configuration check phase, including target validation, credential verification, and scope discovery.
-
Understand XBOW security findings, vulnerability classifications, and how to prioritize remediation based on validated and informational results.