Scanning an IP range with Netsparker

Please click here for a more recent version of this FAQ.

Have more questions? Submit a request

6 Comments

  • 0
    Avatar
    Jason Buhagiar

    Change

    $netsparkerExe = "C:\Program Files (x86)\Mavituna Security\Netsparker\Netsparker.exe"

    to

    $netsparkerExe = "C:\Program Files (x86)\Netsparker\Netsparker.exe"

     

    in the PowerShell script

  • 0
    Avatar
    Hüseyin Tüfekçilerli

    Thanks for the heads up Jason, I have just updated the attached PowerShell script.

  • 0
    Avatar
    Mark Carrizosa

    Do you also happen to have a script for linux instances?

  • 0
    Avatar
    Hüseyin Tüfekçilerli

    Mark,

    Do you need a linux script that automates a Netsparker on a Windows machine? Since Netsparker does not run on linux environment, there are no scripts for launching Netsparker instances on a linux box.

  • 0
    Avatar
    Can

    In this powershell Netsparker is using default policy, right? How can I use custom policy in these automated scans?

  • 0
    Avatar
    Hüseyin Tüfekçilerli

    You can modify the command line arguments and use -p profile_name to instruct Netsparker to use certain scan profile. Please make sure you have selected the desired scan policy on your scan profile file. To summarize, you cannot specify a policy through command line but you can indirectly specify a scan policy by specifying a profile with -p argument.

Please sign in to leave a comment.