Skip to content

DAST Scan Types

AccuKnox DAST uses an automation-driven scanning framework to perform dynamic application security testing. Four scan types are available, each controlling three core components: the Traditional Spider, the AJAX Spider, and the Active Scanner. Choose a scan type based on your development stage and the coverage depth you need.

DAST scan categories preview


How Scanning Works

DAST scanning runs in three sequential phases:

alt text

Baseline skips Phase 3 entirely. All other scan types run all three phases.


Scan Type Comparison

Parameter Baseline Standard Extended Comprehensive
Spider maxDuration 10 min 10 min 10 min 20 min
Spider maxChildren 50 30 50 50
Spider maxDepth 5 5 5 5
AJAX maxCrawlDepth 10 5 10 10
AJAX maxDuration 10 min 10 min 10 min 20 min
AJAX browsers 4 4 4 4
Active Scan ❌ No ✅ Yes ✅ Yes ✅ Yes
Scan Duration N/A 20 min 60 min 100 min
Policy N/A Dev CICD Dev Standard Dev Full
Rule Duration N/A Unlimited Unlimited Unlimited

Baseline vs Full Scan comparison


Baseline Scan

The Baseline Scan is designed for high-frequency testing where speed and safety are paramount. It is a non-invasive, passive-only scan — both spiders run, but no attack payloads are ever sent.

  • Mechanism: Crawls with both the Traditional Spider and AJAX Spider, then performs passive analysis only. No active attack payloads are sent.
  • Vulnerability Focus: Misconfigurations, missing security headers, information disclosure, and cookie security issues.
  • Estimated Duration: 2 – 5 minutes.

Best Used For

Every commit/PR in CI/CD, production scanning, and the first scan on a new target — anywhere speed and zero application risk are required.

Passive Security Baseline Audit Details

A rapid, non-intrusive scan that crawls the application with both spiders and performs passive analysis only — no attack payloads are sent. It checks for missing security headers (Content-Security-Policy, X-Frame-Options, X-Content-Type-Options), insecure cookie flags (Secure, HttpOnly, SameSite), information disclosure in headers or error messages, insecure form fields, and exposed stack traces. Rules are categorized by severity so warnings can be promoted to failures or suppressed as needed. Safe for production and optimized for CI/CD pipelines.

Standard Scan

The Standard Scan runs both spiders with conservative limits, then performs an active scan using the Dev CICD policy.

  • Mechanism: Both spiders run with tighter crawl limits to keep duration predictable, followed by a targeted active scan.
  • Vulnerability Focus: SQL injection, reflected XSS, path traversal, CSRF, plus all passive findings.
  • Estimated Duration: 15 – 30 minutes.

Best Used For

Nightly/weekly CI/CD pipelines, pre-release gates in staging, and dev branch validation.


Extended Scan

The Extended Scan increases crawl depth for better endpoint coverage, then runs the Dev Standard policy for a 60-minute active scan.

  • Mechanism: Higher maxChildren (50) and AJAX maxCrawlDepth (10) ensure deeper discovery before the active scan begins.
  • Vulnerability Focus: Same vulnerability classes as Standard, but with significantly better endpoint coverage on complex applications.
  • Estimated Duration: 60 – 90 minutes.

Best Used For

Single-page applications (SPAs), complex JavaScript apps, deep admin panels, and biweekly assessments.


Comprehensive Scan

The Comprehensive Scan provides maximum coverage. The spider runs for 20 minutes and the active scan uses the Dev Full policy for up to 100 minutes.

  • Mechanism: Maximum spider duration and crawl depth, followed by the most thorough active scan policy available.
  • Vulnerability Focus: Edge-case vulnerabilities, timing-based attacks, and rarely accessed paths — in addition to all Standard/Extended findings.
  • Estimated Duration: 2 – 3 hours.

Best Used For

Quarterly audits, SOC 2/PCI compliance prep, pen test supplementation, and new application onboarding.

Advanced Active Penetration Testing Rules Details

A deep-dive assessment that actively sends malicious payloads to mimic a real-world attacker. It tests for injection flaws (SQL/NoSQL, OS Command, SSTI, XXE), client-side attacks (reflected and stored XSS, CSRF), broken access control (Path Traversal, RFI, SSRF), and infrastructure issues (Buffer Overflows, Insecure File Uploads, Cloud Metadata Leakage). Each input is tested with hundreds of payload variations to bypass WAF filters, and attack patterns are adapted to the detected technology stack (Java, PHP, .NET, etc.). Findings are ranked by severity to prioritize remediation. Sends active attack traffic — recommended for staging or development environments only.


YAML Configuration Reference

AccuKnox DAST scans are driven by a single YAML configuration file. Below is a complete example using the Standard scan type. Adjust the maxDuration, maxChildren, maxCrawlDepth, maxScanDurationInMins, and policy values to match your chosen scan type from the comparison table above.

Example YAML

---
env:
  contexts:
  - name: "accuknox-dast"
    urls:
    - "https://your-app.example.com"
    includePaths:
    - "https://your-app.example.com.*"
    excludePaths:
    - ".*\\.css"
    - ".*\\.js"
    - ".*\\.png"
    - ".*\\.jpg"
    - ".*\\.woff2"

jobs:
- type: spider
  parameters:
    maxDuration: 10
    maxChildren: 30
    maxDepth: 5

- type: spiderAjax
  parameters:
    maxCrawlDepth: 5
    maxDuration: 10
    numberOfBrowsers: 4

- type: passiveScan-wait
  parameters:
    maxDuration: 5

- type: activeScan
  parameters:
    maxScanDurationInMins: 20
    policy: "Dev CICD"
    maxRuleDurationInMins: 0

- type: report
  parameters:
    template: "traditional-json"
    reportDir: "/dast/wrk"
    reportFile: "scanreport.json"

Configuration Block Reference

Block What It Does
env.contexts.urls The target URL to scan. Replace with your application URL.
includePaths Regex patterns for URLs that should be tested. Typically your app domain with a wildcard.
excludePaths Regex patterns for URLs to skip. Always exclude static assets (.css, .js, .png, .woff2) to reduce scan noise and time.
failOnError When true, exits with an error code if any job fails. Enable in CI/CD pipelines so failed scans block the build.
spider Crawls your app by following HTML links. maxDuration caps run time; maxChildren limits links per page; maxDepth controls how deep it goes.
spiderAjax Opens real headless browsers to navigate JavaScript-rendered pages, SPAs, and dynamic routes the HTML spider cannot see.
passiveScan-wait Waits for passive analysis of collected traffic without sending attack payloads.
activeScan Sends attack payloads to every discovered endpoint. The policy field controls which vulnerability rules run. Remove this block entirely for a Baseline scan.
report Generates the JSON output file that gets uploaded to AccuKnox.