Reference
Technical reference documentation for XBOW Console.
Articles in this section
-
IP addresses and hostnames used by XBOW for penetration testing. Configure your firewall to allow XBOW access.
-
Upload source code, documentation, and other artifacts to guide XBOW penetration testing.
-
Methods supported for XBOW to authenticate to access a target and assess it.
-
Configure which endpoints XBOW can attack, access for authentication only, or block entirely during penetration testing.
-
Configure domain scope rules for XBOW penetration testing. Learn about attackable, allow, and blocked domain settings.
-
Web applications supported for XBOW penetration testing, including requirements and compatibility considerations.
-
Vulnerabilities detected by XBOW grouped by Common Weakness Enumeration (CWE) classification.