Skip to main content

Exploit Scans

Description Exploit Scans

Users are able to take advantage of the scanning feature by selecting from various scan options such as Domain, Direct, and Request. Upon completion of the scan, users can view results in the form of logs or a database. However, this exploit scan feature will appear if you only use the SQLi Exploitation tool. Exploit Scans Capture

info
  • Task Name is the name of the target being scanned
  • Tool Name namely the tool used on the target
  • Target is the target to be scanned in the form of a domain or IP
  • Start Date is the time the target was scanned
  • Status indicates the current condition of the target, and it is marked as Completed when the target has been successfully scanned

View SQLi Exploitation Summary

On the Exploit Scans page, users can see targets that use the exploit scan feature as follows. Exploit Scans Capture Users can click on the blue task (example: helium) and they will be directed to a summary results page of the scan, in the form of concise information as follows. Detail Scans SQLi Capture