Authentication Types

Authenticated scans ensure the best and the most efficient coverage of the scan target


The Nexploit authentication capabilities allow you to scan all the login-protected resources within your target application or API. If you need to scan an application or API with some authenticated pages, you first need to configure Nexploit with the correct authentication method(s) and valid credentials, so that it can easily reach each of them when running a scan.

By creating an authentication object, you enable Nexploit to reach complete scan coverage of the target application or API during the security testing.



The created object is available only for the user who has created it. Other users of the same organization cannot add this specific object to their scans. However, they can run, edit and re-test the existing scans with the authentication objects created by other users.

The authentication setup enables you to test access to the authenticated resources covered by the created object before using it in a scan, easily determine the configuration failures and fix them.

You can enable Nexploit to get access to an authenticated resource by using any of the following authentication options:

  • Form authentication - the default method of authentication, used for authentication requests with the content type set as application/x-www-form-urlencoded.
  • Header authentication - the most straightforward method of authentication, used for static header authentication tokens that are generated outside of Nexploit and will not expire during a scan.
  • API call - the most flexible method of authentication, used for multiple API requests that include customized request bodies.
  • OpenID Connect (OAuth) - the authentication method you can use to get access to authenticated resources that support OIDC.
  • Custom Multi-Step Authentication - the authentication method used for configuration of a custom authentication object. You can create a single-stage authentication flow or add as many stages as the Nexploit engine should pass through to access the authenticated resource. During the authentication object configuration, you will need to create templates for some values using the String Interpolation Syntax
  • Browser-based form authentication - is a simplified option of the form authentication method. You only need to specify the fields given on a login page and valid credentials to be entered in the relevant fields.
  • NTLM authentication - the authentication method used to establish connection between a user’s workstation and a corresponding network which uses the NTLM protocol.

If you need to get access to a scan target via a Repeater using the HMAC authorizarion, see Using Repeater Scripts.


To create an authentication object in Nexploit by using any of the available authentication options, you will need to get valid parameters and values required for a successful authentication setup, the specific parameters depend on the required authentication flow. You can find them in the browser DevTools of your application. To do that, follow these steps:

  1. Open the DevTools in your application.
  2. In the DevTools, select the Network tab.



Make sure that the Preserve log checkbox is selected.

  1. Perform a request by submitting the login call.
  2. Use the data of the relevant login request when completing the authentication setup fields.



It is important to select the actual login request from the overall list to pass the authentication setup successfully.

Did this page help you?