SUPPORT

24/5 Hotline Support Service

+44 (0)20 3588 3841

Open a Support Ticket

support@netsparker.com

Excluding File Types From a Scan

By default, Netsparker ignores some URLs that do not need to be scanned, using a list of excluded file types or extensions, from scans. It is possible to modify this list of excluded file types from the Extensions tab when configuring a Scan Policy.

Excluding Binary Files

By default, Netsparker does not crawl and analyze binary files during a scan. They are outside the scope of scanning a web application for vulnerabilities. In fact the Netsparker scanners have a built-in mechanism to check if HTTP responses are binary responses; if they are, they will be excluded from scans.

If you have a number of binary files on your website, add their extension to this Extensions list, so that when the Netsparker scanners identify them they do not have to make the binary check. The advantage is that this shortens the scan duration.

Crawl and Attack Options

This table lists and describes the crawl options in Netsparker.

Crawl Option

Description

Do not Crawl

Netsparker does not crawl file links and adds them to the Out of Scope with Extension Blacklisted reason.

Crawl

File links will be crawled.

Crawl Only Parameter

File links will be crawled if they have any Query String parameters. Otherwise they will be added to the Out of Scope with Extension Blacklisted reason.

This table lists and explains the attack options in Netsparker.

Attack Option

Description

Do not Attack

File links will be ignored.

Attack Parameters

File links will be analyzed if they have a parameter.

For example:

Attack Parameters and Query String

File links will be analyzed if they have a parameter or Query String.

For example:

How to Exclude File Types From a Scan in Netsparker Enterprise

  1. From the main menu, click Policies, then Scan Policies.
  2. Do one of the following (see Overview of Scan Policies):
    • Next to an existing policy, click Clone
    • From the main menu, click Policies, then New Scan Policy
  3. In New Scan Policy window, click the Extensions tab.

  1. You can create a new exclusion or edit an existing one. Either:
    • Select an existing item by clicking into its EXTENSION field.
    • Click New to create a new, blank Extensions row.
      • Enter the extension you want to exclude in the EXTENSION field
  2. From the CRAWL dropdown, select an option (see Crawl and Attack Options).
  3. From the ATTACK dropdown, select an option (see Crawl and Attack Options).
  4. Click Save.

How to Exclude File Types From a Scan in Netsparker Standard

  1. From the Home ribbon, click New. The Start a New Website or Web Service Scan dialog is displayed.
  2. From the Scan Policy section, click the ellipsis () to open the Scan Policy Editor.
  3. Do one the following (see Scan Policy Editor):
    • From the list at the top of the dialog, select an existing Scan Policy (avoid the default ones as they can't be customised)
    • Alternatively, select an existing Scan Policy and click Clone
    • Click New
  4. From the left-hand menu, click Extensions.
  5. You can create a new exclusion or edit an existing one. Either:
    • Click into the last (blank) row in the Extensions table
      • In the Extension field, enter the extension you want to exclude
    • Select an existing item by clicking into the Extension field
  6. In the Crawl column, click into the cell and from the dropdown, select an option (see Crawl and Attack Options).
  7. In the Attack column, click into the cell and from the dropdown, select an option (see Crawl and Attack Options).
  8. Click OK.
Netsparker

Dead accurate, fast & easy-to-use Web Application Security Scanner

GET A DEMO