Reference

Technical reference documentation for XBOW Console.

Articles in this section

  • IP addresses and hostnames used by XBOW for penetration testing. Configure your firewall to allow XBOW access.

  • Upload source code, documentation, and other artifacts to guide XBOW penetration testing.

  • Methods supported for XBOW to authenticate to access a target and assess it.

  • Configure which endpoints XBOW can attack, access for authentication only, or block entirely during penetration testing.

  • Configure domain scope rules for XBOW penetration testing. Learn about attackable, allow, and blocked domain settings.

  • Web applications supported for XBOW penetration testing, including requirements and compatibility considerations.

  • Vulnerabilities detected by XBOW grouped by Common Weakness Enumeration (CWE) classification.