Scanning an IP range with Netsparker Hüseyin Tüfekçilerli November 07, 2017 08:56 Follow Please click here for a more recent version of this FAQ. Have more questions? Submit a request 6 Comments Date Votes 0 Can November 23, 2015 09:55 In this powershell Netsparker is using default policy, right? How can I use custom policy in these automated scans? 0 Hüseyin Tüfekçilerli November 23, 2015 16:06 You can modify the command line arguments and use -p profile_name to instruct Netsparker to use certain scan profile. Please make sure you have selected the desired scan policy on your scan profile file. To summarize, you cannot specify a policy through command line but you can indirectly specify a scan policy by specifying a profile with -p argument. 0 Jason Buhagiar November 07, 2014 10:55 Change $netsparkerExe = "C:\Program Files (x86)\Mavituna Security\Netsparker\Netsparker.exe" to $netsparkerExe = "C:\Program Files (x86)\Netsparker\Netsparker.exe" in the PowerShell script 0 Hüseyin Tüfekçilerli November 07, 2014 18:00 Thanks for the heads up Jason, I have just updated the attached PowerShell script. 0 Mark Carrizosa October 27, 2015 22:51 Do you also happen to have a script for linux instances? 0 Hüseyin Tüfekçilerli October 28, 2015 06:44 Mark, Do you need a linux script that automates a Netsparker on a Windows machine? Since Netsparker does not run on linux environment, there are no scripts for launching Netsparker instances on a linux box. Please sign in to leave a comment.