You can use the Normal or Web profile in the Penetrator.
Articles in this section
- Are there impact to devices when scanning?
- How long does it take to scan and IP? In general?
- How can I change reporting language
- Can I customize reporting in the Penetrator?
- Do the Penetrator check for SSL vulnerabilities?
- Scanning Infrastructure SCADA
- IoT Infrastructure
- OWASP TOP 10 Profile Question
- Just want to ask is there an options in the Secpoint that you can exclude some services or port?
- How can the AI Machine Learning module in the Penetrator Benefit?