Skip to main content
VulnProScanby Dynamgenix IT Corp

DAST · OWASP-aligned · API Security · 12 Testing Domains

Security coverage built for real applications

Vuln Pro Scan runs structured testing across 12 security domains — from injection flaws and broken authentication to TLS weaknesses, API exposure, and security header gaps — giving teams a clear, categorized view of their external attack surface.

12

Testing domains

100+

Distinct check types

2

Scan modes

OWASP

Methodology

What we test

Each domain maps to established OWASP testing categories. Findings are returned with severity, evidence, affected endpoint, and remediation context.

Information Gathering & Attack Surface

Maps externally visible assets, endpoints, and exposed interfaces before any active testing begins.

  • Admin panels accessible without authentication
  • Directory listings and backup file exposure
  • Sensitive paths and debug endpoints
  • Server software and version disclosure
Public scan

Configuration & Deployment

Identifies server, infrastructure, and deployment misconfigurations that widen the attack surface.

  • Insecure CORS policies allowing arbitrary origins
  • HTTP methods unnecessarily enabled (PUT, DELETE, TRACE)
  • Misconfigured cache-control headers for sensitive content
  • Exposed Swagger, OpenAPI, or GraphQL introspection endpoints
Public scan

Authentication Weaknesses

Tests login flows and credential-handling for weaknesses that allow unauthorized account access.

  • Username enumeration via response differences
  • Missing brute-force and rate-limit protections
  • Weak password policy enforcement
  • Multi-factor authentication bypass patterns
Both scan types

Authorization & Access Control

Verifies that users can only access resources they are explicitly permitted to view or modify.

  • Insecure direct object references (IDOR)
  • Horizontal privilege escalation between accounts
  • Unprotected admin or privileged functionality
  • Missing function-level access controls on API routes
Authenticated scan

Session Management

Inspects session token handling, cookie security attributes, and CSRF protection coverage.

  • Session cookies missing HttpOnly or Secure flags
  • SameSite attribute absent or misconfigured
  • Session fixation vulnerabilities
  • Cross-site request forgery (CSRF) exposures
Both scan types

Core Web Vulnerabilities

Runs active injection and manipulation tests across all discovered parameters and form fields.

  • SQL injection (error-based, blind, time-based)
  • Reflected, stored, and DOM-based cross-site scripting
  • Open redirect and URL manipulation
  • Path traversal and local file inclusion attempts
Both scan types

Sensitive Data Exposure

Identifies places where the application leaks confidential data through responses, errors, or headers.

  • Stack traces and detailed error messages in production
  • Personally identifiable information in URL parameters
  • API keys, tokens, or credentials in HTTP responses
  • Sensitive internal paths and filenames exposed
Both scan types

Security Headers & Browser Protections

Audits HTTP response headers that instruct browsers how to enforce security policies.

  • Missing or weak Content-Security-Policy (CSP)
  • HTTP Strict Transport Security (HSTS) absent
  • Clickjacking risk — X-Frame-Options or CSP frame-ancestors missing
  • Referrer-Policy, Permissions-Policy not configured
Public scan

TLS & Transport Security

Evaluates the strength and configuration of encrypted transport to prevent interception attacks.

  • Deprecated TLS 1.0 / 1.1 protocol support
  • Weak or insecure cipher suite configuration
  • Mixed HTTP/HTTPS content loading
  • HSTS preload and max-age enforcement gaps
Public scan

API Security

Tests REST and GraphQL endpoints for authentication bypass, over-exposure, and injection risks.

  • Unauthenticated API endpoints returning sensitive data
  • Missing rate limiting on API routes
  • Verbose API error responses disclosing internals
  • GraphQL introspection enabled in production
Both scan types

Client-Side Security

Analyzes the application's browser-side behavior for injection surface and policy enforcement gaps.

  • DOM-based cross-site scripting via dangerous sinks
  • Clickjacking susceptibility without frame protection
  • Insecure third-party script loading (subresource integrity missing)
  • Sensitive data stored in localStorage or sessionStorage
Public scan

Business Logic & Advanced Findings

Identifies flaws in application workflows that automated checks alone cannot always surface.

  • Mass assignment and parameter tampering
  • Workflow step bypass and sequence manipulation
  • Insecure file upload and processing paths
  • Account takeover pathways through weak reset flows
Authenticated scan

Public and authenticated scanning

The scan mode determines which parts of the application are reachable. Authenticated scans significantly expand coverage into protected areas that anonymous scanning cannot reach.

Public scan

No credentials required

Tests the application surface reachable without authentication — ideal for an initial exposure assessment or verifying your public-facing security posture.

  • Surface enumeration and attack surface mapping
  • Security header and TLS configuration checks
  • Public endpoint injection testing (XSS, SQLi, open redirect)
  • Information disclosure and verbose error detection
  • CORS and deployment misconfiguration checks

Authenticated scan

Deeper coverage behind login

Logs into the application using supplied credentials, then crawls and tests protected areas — surfacing access control, session, business logic, and API findings that an unauthenticated scan cannot reach.

  • Authorization and IDOR testing in protected areas
  • Session management and cookie security checks
  • Authenticated API endpoint coverage
  • Business logic and workflow bypass testing
  • Post-login injection and XSS across all parameters

Findings organized for action

Every finding is structured so engineers can reproduce, triage, and fix issues without needing a dedicated AppSec specialist to interpret the output.

Severity-based prioritization

Findings are classified as Critical, High, Medium, Low, or Informational — enabling teams to fix the highest-risk issues first without guesswork.

Category and endpoint grouping

Each finding is tagged by security category (e.g. Injection, Headers, Auth) and linked to the specific asset and endpoint where it was detected.

Authentication context

Findings indicate whether they were discovered during a public or authenticated scan, clarifying scope and reproducing steps.

Remediation guidance

Each finding includes a short explanation of the risk and a remediation direction developers can act on without cross-referencing external documentation.

Trend and activity history

The dashboard surfaces findings over time across scan runs, showing new issues, resolved findings, and overall security posture trends.

Asset-level visibility

View findings grouped by host or asset — useful for teams with multiple properties or environments running parallel scan programs.

Coverage by testing domain

A quick reference for what Vuln Pro Scan exercises across your application surface.

DomainPublic scanAuth scanKey examples
Attack surface mappingAdmin panels, directory listings, verbose banners
Configuration issuesCORS, HTTP methods, debug endpoints
Authentication weaknessesRate limiting, enumeration, weak policy
Authorization & IDORHorizontal privilege, missing function guards
Session managementCookie flags, CSRF, session fixation
XSS / SQLi / InjectionReflected, stored, DOM, blind SQLi
Sensitive data exposureStack traces, API keys in responses
Security headersCSP, HSTS, X-Frame-Options, Referrer-Policy
TLS & transportWeak ciphers, TLS 1.0/1.1, mixed content
API securityUnauthed endpoints, GraphQL introspection
Client-side securityDOM XSS, SRI missing, clickjacking
Business logicMass assignment, workflow bypass

Ready to see your real attack surface?

Try a demo scan in minutes — no agents, no instrumentation. After you sign in with approved access, use the full product for authenticated scanning and deeper coverage.