In this article you will find:

  1. How to configure WhiteHat connector

  2. How to view DAST result in Vulcan

  3. How to view SAST and SCA result in Vulcan

1. Configure WhiteHat Connector

In the Connectors page, click on Add a Connector

Click on WhiteHat connector.

Fill in the relevant field:

API Key - Key to communicate with WhiteHat API.

To retrieve the API Key, login to your WhiteHat account and navigate to My Profile --> API Key

Click on Create
You can see the connector's log under the Log tab.

2. How to view WhiteHat DAST results in Vulcan

Results from WhiteHat DAST can be found under 2 views:

  • Assets - Enables the user to view the scanned sites and their related vulnerabilities

  • Vulnerabilities - Enables the user to view all the vulnerabilities from all data types in one view.

Assets

Each WhiteHat's Site is an asset of type Website in Vulcan

By clicking on the website record, you will see all the vulnerabilities found by WhiteHat's DAST, including metadata on the site itself

Vulnerabilities

You can find all the vulnerabilities came from WhiteHat by navigating to Vulnerabilities and filter by source WhiteHat

By clicking on a vulnerability record you can see all the vulnerability's data from WhiteHat.

3. How to view WhiteHat SCA and SAST results in Vulcan

Results from WhiteHat SCA and SAST can be found under 2 views:

  • Assets - Enables the user to view the scanned applications and their related vulnerabilities

  • Vulnerabilities - Enables the user to view all the vulnerabilities from all data types in one view.

Assets

Each WhiteHat's Application is an asset of type Code Project in Vulcan

By clicking on the code project record, you will see all the vulnerabilities found by WhiteHat's SCA and SAST, including metadata on the application itself.

Vulnerabilities

You can find all the vulnerabilities that came from WhiteHat by navigating to Vulnerabilities and filter by source WhiteHat

By clicking on a vulnerability record you can see all the vulnerability's data from WhiteHat.

Did this answer your question?