• Why Choose Us
  • How It Works
  • Penetration Testing
    Penetration Testing Service

    Continuously find and fix your security gaps.

    Application Penetration Testing

    Benefit from our Cloud Penetration Testing expertise

    Cloud Penetration Testing Services

    External and Internal Penetration Testing

    Web Application Penetration Testing

    Conduct manual penetration testing on application to achive complience

    Network Penetration Testing

    OWASP compliant Web Penetration Testing Services

    Social Engineering

    Our unique OSINT and Phishing Exposure Assessment

  • Clients
Login
  • Why Choose Us

  • How It Works

  • Penetration Testing
    • Penetration Testing Service
    • Cloud Penetration Testing Services
    • Network Penetration Testing
    • Application Penetration Testing
    • Web Application Penetration Testing
    • Social Engineering

  • Clients

  • Login

Contact Us
+1 917-779-0009

Have a Question About the BreachLock Cloud Platform? Enter it below.

Get a Quote

6 May, 2020

BreachLock Login Assistant

BreachLock login assistant is a user-friendly interactive method to run authenticated scans on your Web Applications.

Now, BreachLock does allow you to run an authenticated scan on your web applications even without the login assistant. You can do this by simply going to “scans” section for the Web Application Scanning (DAST) module of the BreachLock SaaS platform and providing the credentials in any one the below mentioned places:

1) Click on the “Add New scan” button on the scan section and providing the login credentials while adding the asset for the Web Application Scanning (DAST).

2) If your Web application is already present in the “Scans” section, then you can use the “edit scan” button under “Actions” to provide us the credentials and run authenticated scans

 

But if you don’t want to provide us the login credentials over here or think that this is too much work. You can rely on the BreachLock login assistant.

Using the BreachLock login assistant, you can either provide us with a session cookie or record your login sequence, and our Web Application (DAST) scanner will use the same data to log in to your web application.

What are the best practices to use BreachLock Login Assistant?

While using the BreachLock login assistant, we would recommend you keep a few things in mind:

1) You are not using the BreachLock login assistant in an incognito tab.

2) We recommend you use the BreachLock login assistant in an entirely new chrome window. You should be logged into the BreachLock SaaS platform in one of the tabs.

Where will you get the BreachLock Login Assistant?

To download the BreachLock Login Assistant click here.

You can also download it from the BreachLock SaaS platform by navigating to the “Edit Scan” under “Scans section

Once downloaded, you need to add it as a browser extension for chrome.

As you can see in the above image you have two methods you can choose from:

Method 1: Authentication using session token.

Method 2: Authentication using the recorded login sequence.

 

Authentication using session token: This will record the session cookie and use them to run authenticated scans.

1) Click on the chrome extension and choose Method 1.

2) Click on “Get Started.”

3) Go to the login page of your web application and click “Continue.”

4) Log in to your web application and click “Continue.”

5) Unselect the non- relevant cookies to do not want to share and click continue.

 

6) You will be asked for an “Authentication Token.”

You can get the “Authentication Token” from https://app.breachlock.com/assets/ and then clicking on the “API Key” under actions.

 

After entering the authentication token, we will record the session token and an authenticated DAST scan will begin on the web application in the next 10 minutes.

 

Authentication using the recorded login sequence: This will record the login sequence you use to login to your web application and helps our DAST scanner follow the same trail. 

1) Click on the chrome extension and choose Method 2.

2) Click on “Get Started.”

3) Click on “Start Recording.”

4) Log in to your web application and click “Stop Recording.”

5) Unselect the non- relevant steps to do not want to share and click continue.

 

6) You will be asked for an “Authentication Token.”

You can get the “Authentication Token” from https://app.breachlock.com/assets/ and then clicking on the “API Key” under actions.

 

After entering the authentication token, we will record the session token and an authenticated DAST scan will begin on the web application in the next 10 minutes.

Back To Other Posts
Penetration Testing

Penetration Testing Service

Cloud Penetration
Testing Services

Network Penetration Testing

Application Penetration
Testing

Web Application
Penetration Testing

Social Engineering

Learn more about BreachLock. Read our

FAQ Page

Our Blog Post

Blog-1

Lorem ipsum dolor sit amet consectetur adipisicing elit. Vero amet consequuntur consectetur sequi, nemo aperiam voluptates esse vel iure. Deleniti.

Read More
Video-1

Video Lorem, ipsum dolor sit amet consectetur adipisicing elit. Vero dolores in sapiente! Repudiandae nobis distinctio perspiciatis culpa. Expedita, nesciunt adipisci!

Read More
News-4

 Lorem ipsum dolor sit amet consectetur adipisicing elit. Nemo ad impedit ducimus. Laborum voluptate eveniet inventore repudiandae maxime ea soluta et ab? Ipsum quod deleniti magni dolor cum asperiores amet?

Read More
News-3

Lorem ipsum dolor sit amet consectetur adipisicing elit. Nemo ad impedit ducimus. Laborum voluptate eveniet inventore repudiandae maxime ea soluta et ab? Ipsum quod deleniti magni dolor cum asperiores amet?

Read More
News

Lorem ipsum dolor sit amet consectetur adipisicing elit. Nemo ad impedit ducimus. Laborum voluptate eveniet inventore repudiandae maxime ea soluta et ab? Ipsum quod deleniti magni dolor cum asperiores amet?

Read More
news

Lorem ipsum dolor sit amet consectetur adipisicing elit. Nemo ad impedit ducimus. Laborum voluptate eveniet inventore repudiandae maxime ea soluta et ab? Ipsum quod deleniti magni dolor cum asperiores amet?

Read More
Hello world!

Welcome to WordPress. This is your first post. Edit or delete it, then start writing!

Read More
View All Posts

Once you do, we'll reach out to:

  • Ask you a few questions
  • Understand your scope and timeline
  • Determine if there's a good fit
  • Provide a competitive quote within 24 hours

Industry recognitions we have earned


Logo 1
Logo 2
Logo 3
Logo 4
Logo 5
Logo 6
Logo 1 Small
Logo 2 Small
Logo 3 Small
Logo 4 Small
Logo 5 Small
Logo 6 Small
Logo 1 mobile
Logo 2 mobile
Logo 3 mobile
Logo 6 mobile
Logo 4 mobile
Logo 5 mobile

Tell us about your requirements. We respond the same business day.

Fill out the form below to let us know your requirements. We will contact you to determine if BreachLock™ is right for your business or organization.

About BreachLock

  • Why BreachLock
  • How it Works
  • Cloud Platform
  • Client Testimonials
  • Partner Program
  • Careers
  • Privacy Policy
  • Terms of Use
  • Contact Us

Penetration Testing

  • Penetration Testing As a Service
  • Network Penetration Testing
  • Web Application Penetration Testing
  • Application Penetration Testing
  • Cloud Penetration Testing
  • IoT Penetration Testing
  • DevSecOps Penetration Testing
  • Social Engineering

Vulnerability Scanning

  • Web Vulnerability Scanner
  • Vulnerability Assessment

Compliance

  • PCI DSS
  • HIPAA
  • GDPR
  • Vendor Assessment

Resources

  • Blog
  • FAQ
  • Infographic
  • Support Videos
  • On-demand Webinars

BreachLock inc.

276 5th Avenue Suite 704 – 3031 New York NY 10001

+1 917-779-0009

BreachLock Netherlands B.V

Kon. Wilheminaplein 1 World Fashion Centre – Tower 4 1062 HG Amsterdam

+31 20 3230 007

hello@breachlock.com

+1 302 516-7152

© 2021, BreachLock Inc.

Site Design and Development by: Alpha Efficiency