01
Overview
PT BlackBox is a black-box security scanner for web applications.
It makes the job of security researchers easier and provides useful information to help fix vulnerabilities.
PT BlackBox core makes it possible to use data from other Positive Technologies products. The PT BlackBox knowledge base includes many years of research results and practical experience of cybersecurity experts, and is constantly being updated.
PT BlackBox core makes it possible to use data from other Positive Technologies products. The PT BlackBox knowledge base includes many years of research results and practical experience of cybersecurity experts, and is constantly being updated.
Input data
91%
of web applications are vulnerable to information leakage72%
of web application vulnerabilities arise from software bugs84%
of web applications are vulnerable to unauthorized access48%
of web applications have a low or extremely low security level
02
Key capabilities
- Lowers resource consumption by recognizing and skipping duplicate pages.
- Uncovers hidden threats using a combination of signature and heuristic analysis. Continuously updates information on vulnerabilities.
- Can be integrated into the development and release cycle for efficient vulnerability detection and remediation.
- Users can customize analysis parameters, including authorization settings, and add scanning profiles.
Comparison of PT BlackBox and PT BlackBox Scanner
03
PT BlackBox Scanner without registration | PT BlackBox Scanner with registration | PT BlackBox on premises | |
---|---|---|---|
User authorization | - | + | + |
Customizable target settings | - | + | + |
Fast scanning (micro) | + | + | + |
Full scanning (optimal) | - | + | + |
Customizable scanning profiles | - | - | + |
Authorization in targets (various types) | - | - | + |
CI/CD scenarios to launch scans | - | + | + |
Simultaneous scanning of multiple targets | - | - | + |
04
Extra materials
Get in touch
Fill in the form and our specialists
will contact you shortly
will contact you shortly