Burp Enterprise Scan
BurpSuite Enterprise is a web vulnerability scanner that is designed for enterprise-level web application security testing.
AppSec Portal Importer Name: Burp Enterprise Scan
It is a scalable solution that allows security teams to conduct efficient and comprehensive security assessments of their web applications.
BurpSuite Enterprise offers a wide range of automated scanning capabilities, including the ability to perform advanced scans on complex web applications and identify vulnerabilities such as SQL injection, cross-site scripting (XSS), and authentication bypass. The scanner also includes a variety of customization options, allowing users to configure the scanner according to their specific testing requirements.
Curl example
curl -X POST localhost/api/v1/scan/import/ -H "Authorization: Token a75bb26171cf391671e67b128bfc8ae1c779ff7b" -H "Content-Type: multipart/form-data" -F "file=@./bis.json" -F "product_name=Product1" -F "product_type=Application" -F "scanner_name=Burp Enterprise Scan" -F "branch=dev"
In this command, the following parameters are used:
-X POST
: specifies the HTTP method to be used (in this case, POST)-H "Authorization: Token <authorization_token>"
: specifies the authorization token obtained from AppSec Portal.-H "Content-Type: multipart/form-data"
: specifies the content type of the request.-F "file=@<report_file_path>"
: specifies the path to the report file generated by the scanner.-F "product_name=<product_name>"
: specifies the name of the product being scanned.-F "product_type=<product_type>"
: specifies the type of the product being scanned.-F "scanner_name=<scanner_name>"
: specifies the name of the scanner used to generate the report (Burp Enterprise Scan)-F "branch=<branch_name>"
: (optional) specifies the name of the branch in the source code repository (if applicable) This parameter is particularly useful when you want to associate the scan results with a specific branch in your repository. If not provided, the scan will be associated with the default branch
Last updated
Was this helpful?