Ds Whitehat Dast
Ds Whitehat Dast
Ds Whitehat Dast
Years of valuable data gathered by our highly trained security experts is used to
develop our proprietary AI/ML models. This approach provides fast, automated results
augmented by expert validation, enabling earlier detection and faster response to
cyberattacks.
How WhiteHat
Dynamic works
WhiteHat Dynamic combines
automated application scanning
Onboarding Initial scanning Website assessment Reporting
with the world’s largest security
expert team to provide you Customer provides Discovery, Unlimited assessments, Results displayed
with verified vulnerabilities and URLs, logins, and fine-tuning, and vulnerability detection, in a portal with
actionable reports. schedule configuration and verification customizable
reports
| synopsys.com | 1
Choose the WhiteHat edition best suited to your needs
WhiteHat PE (Premium Edition) WhiteHat SE (Standard Edition) WhiteHat BE (Baseline Edition)
• For mission-critical permanent websites • For permanent websites that are not • BE is the foundational solution for basic,
with multistep forms and rigorous necessarily mission-critical less-critical websites
compliance requirements • Includes all BE features and tests for • Includes automated scanning and
• Includes all SE features and business issues involving multistep forms and vulnerability verification, ideal for lower-
logic testing logins risk websites
FEATURE DESCRIPTION PE SE BE
| synopsys.com | 2
What Makes WhiteHat Dynamic Unique
Enterprise-class reporting in flexible formats
Understand the performance of your security programs and improve application security posture with powerful built-in reports. Advanced
analytics capabilities monitor trends and key statistics such as remediation rates, time-to-fix, and age of the vulnerabilities. Trending
analysis tracks real-time and historical data to measure your risk exposure over time and provide you with visibility into your most- and
least-secure websites at a glance.
Production safe
WhiteHat Dynamic is completely safe for production websites with no performance degradations. Data integrity is assured by using
benign injections in place of live code, and custom tuning of scans permits full coverage without performance impact.
PCI compliance
WhiteHat Dynamic exceeds the requirements of PCI DSS 3.1 by providing ongoing, verified vulnerability assessments for both internal
and public websites. WhiteHat PE includes business logic assessments and penetration testing as required by PCI DSS. Integrations with
WAFs support the creation of virtual patches to fix vulnerabilities while providing the reports needed for auditor inspections.
| synopsys.com | 3
WhiteHat Dynamic | Detectable Vulnerabilities
Technical Vulnerabilities
WASC Threat Classification 2.0 • HTTP Response Splitting OWASP Top 10
• Application Misconfiguration • Improper Output Handling • A1 - Injection
• Directory Indexing • Mail Command Injection • A2 - Broken Authentication and Session
• HTTP Response Smuggling • Path Traversal Management
• Improper Input Handling • Routing Detour • A3 - Sensitive Data Exposure
• Insufficient Transport Layer Protection • SSL Injection • A4 - XML External Entities (XXE)
• OS Commanding • Injection • A5 - Broken Access Control
• Remote File Inclusion • Cross-Site Scripting • A6 - Security Misconfiguration
• SQL Injection • Format String Attack • A7 - Cross-Site Scripting (XSS)
• XML External Entities • Improper File System Permissions • A8 - Insecure Deserialization
• XQuery Injection • Information Leakage • A9 - Using Components with Known
• Content Spoofing • Null Byte Injection Vulnerabilities (Out of Scope)
• Fingerprinting • Predictable Resource Location • A10 - Insufficient Logging & Monitoring
• Server Misconfiguration (Out of Scope)
• URL Redirector Abuse
• XPath Injection
Note: A compatible list per product line available
upon request
For more information about the Synopsys Synopsys, Inc. U.S. Sales: 800.873.8193
Software Integrity Group, visit us online at 690 E Middlefield Road International Sales: +1 415.321.5237
www.synopsys.com/software. Mountain View, CA 94043 USA Email: [email protected]
©2022 Synopsys, Inc. All rights reserved. Synopsys is a trademark of Synopsys, Inc. in the United States and other countries. A list of Synopsys trademarks is available at
www.synopsys.com/copyright.html . All other names mentioned herein are trademarks or registered trademarks of their respective owners. October 2022
| synopsys.com | 4