Creating A Valid Target Definition: A Quick Guide

This short article will guide you on how to create a valid target definition for targets.

Creating A Valid Target Definition: A Quick Guide
Creating A Valid Target Definition: A Quick Guide

Introduction:

Defining targets accurately is crucial for effective vulnerability scanning within your BLACKBIRD Web App Pentesting Platform and for network scanning in general. Our web app pentesting platform provides a user-friendly, guided process to help you create valid target definitions.

In this article, we'll walk through the three main steps to set up a target definition that meets your specific requirements.

If you do not have an active license yet, you can try a quick demo below. BLACKBIRD Web App Pentesting Platform is a cloud-based web app pentesting platform for penetration testers to help them find more security vulnerabilities through powerful automation.

Step 1: Create Target Definition

The first step involves entering the basic details about your target, let's go through each field:

Target Name: Give your target a descriptive name to help you track it later (e.g., "Example").

Target Domain: Enter the primary or root domain name of your target (e.g., "example.com").

IP Range (optional): Specify the range of IP addresses to include (e.g., "192.168.1.1-254, ..."). Use a comma character to separate multiple IP ranges.

CIDR Range (optional): Define the network using CIDR notation (e.g., "192.168.1.0/24, ...").

Scope: List the domains and subdomains to include in your scan. Wildcards are accepted (e.g., "example.com,*.example.com").

Out of Scope (optional): Specify any subdomains or hosts you want to explicitly exclude. Wildcards are accepted (e.g., "app-stg.example.com,*.app-stg.example.com").

⚠️
Make sure to also explicitly specify the root domain in your in-scope section when using a wildcard.

Example:
If your target is "*.example.com", make sure you set your scope to "example.com,*.example.com" to include the root domain.
Configure your target definition
Configure your target definition

Configuration options:

You may also specify global configuration options that are only applicable to a specific target. An example would be enforcing a rate limit or adjusting the timeout for a specific target.

Scope Request Headers (optional): Add custom headers for your scan requests. In the example, a User-Agent header is set.

Delay in ms (optional): If your client requires you to follow a strict rate-limiting guideline, you can set a delay between each HTTP request to avoid overwhelming the target servers.

Timeout in ms (optional): Specify how long to wait for a response before timing out. Some servers take longer to respond than others, if that's the case with your target, you can override the default timeout setting.

Step 2: Import Hosts (Optional)

In case you already have a list of hosts, this step allows you to import them easily.

Make sure to enter each host on a new line in the provided text area.

If you don't have hosts to import, you can skip this step.

Import your existing list of hosts or subdomains
Import your existing list of hosts or subdomains

Step 3: Review Your Input

The final step presents a summary of all the information you've entered:

Definition: Review the target name, domain, IP range, CIDR range, scope, and out-of-scope entries.

Configuration: Double-check the scope request headers, delay, and timeout settings.

Imported Hosts: Confirm the number of hosts that will be imported (if any).

If everything looks correct, click the "Create Target" button to finalize your target definition. If you need to make changes, use the "Back" button to return to previous steps.

Review your configuration settings for your new target definition
Review your configuration settings for your new target definition

Once created, you will be asked if you'd like to run a reconnaissance scan on your target definition. This scan type is designed to map out all your hosts within your specified scope.

Start a quick reconnaissance scan on your new target definition
Start a quick reconnaissance scan on your new target definition

Conclusion:

Creating a valid target definition is essential for accurate and efficient scanning. By following these steps and carefully reviewing your input, you can ensure that your scans focus on the right targets and respect any necessary scopes or boundaries. Remember to regularly update your target definitions as your network evolves to maintain optimal scanning results.

Read more

Pentester? Want to find more security vulnerabilities?

Leverage the latest attack techniques derived from the ever-evolving bug bounty world with powerful automation!

Product Demo
Pentester? Try a Quick Demo of Our Pentesting Platform →