BugBase Documentation
  • πŸ‘‹Welcome to BugBase Docs
  • Overview
    • πŸ’‘What we do
    • ⚑Changelogs
    • ✨Our Features
    • πŸ“‚Programs at BugBase
      • Vulnerability Disclosure Program (VDP)
      • Bug Bounty Program
      • Private Bounty Program
      • Pentest Program (VAPT)
  • Report Lifecycle
    • Bug Report
    • Report Status
  • How To
    • πŸ‘¨β€πŸ’»Invite Organization Members to BugBase (RBAC)
    • 🚩Setup a Campaign for better program engagement
    • πŸ›Submit a Bug Report on BugBase
    • πŸ“‘Create a Bug Bounty Program on BugBase
    • ⬇️Download the mobile app
  • Company Guide
    • πŸ‘¨β€πŸ’ΌCreate a Company Account
    • 🧭Navigation
    • πŸ›‘οΈAssets Dashboard
    • πŸ—οΈCredential Vaults
      • Creating a Credential Vault
      • Adding Credentials to Vault
      • Connect Credential Vault to an Asset
      • Require Whitelisting for a Credential
    • πŸ”VPN Servers
      • Create, Configure and Deploy VPN server
      • Monitor Live Statistics and Logs
    • πŸ—‚οΈPrograms Dashboard
      • β›³Create a Program
    • πŸ“’Customer Support
    • πŸ’΅Bounty Bin
    • βš™οΈCompany Settings
      • πŸ‘¨β€πŸ«Profile
      • 🏒Organisation
      • πŸ‘¨β€πŸ­Roles and Permissions
      • πŸ”Security & Authentication
        • Multi-Factor Authentication
        • SSO with SAML
          • Okta SSO setup via SAML
          • Google SSO setup via SAML
      • 🎨Customization
        • Automations
        • Report Tags
      • πŸ“™Manage Access
    • πŸ“ˆInsights Dashboard
    • πŸ”ŠCampaigns
    • πŸ’²Understanding Currencies Used in BugBase
    • 🀝Whitelist
  • Program guide
    • Bug Bounty Dashboard
      • Program Reports Section
        • Report Components
        • Report Actions
        • Duplicating Reports
        • Assigning Swags
        • Assigning Bounties
        • Assigning Thanks to Reporters
        • Assigning Bonus Bounty
        • Automatic Response Generator using ChatGPT
      • Program Policy
        • Editing Program Policy
          • Best Practices For Designing Policy
          • Best Practices For Bounty Tables
      • Payouts
      • Settings
    • Private Bug Bounty Dashboard
      • Invite Hackers
      • Manage Credentials
    • VDP Dashboard
    • Pentest Dashboard
      • Pentest Overview
      • Vulnerabilities Section
        • Pentest Report Components
        • Pentest Report Actions
      • Global Pentest Chat
    • Competition Dashboard
      • Dashboard
      • Creating a Competition
        • Adding Challenges
      • Manage Competitions
        • Statistics
        • Leaderboard
        • Manage Users
  • Bounty Hunter Guide
    • Bounty Hunter Dashboard
    • Bounty Hunter Profile
    • Programs Directory
      • Program Policy Page
      • Credentials
      • VPN Access
      • Whitelist
      • Collaborate
    • Bounty Hunter Reports Section
      • Submitting Reports
      • Interaction with Program Representees
      • Collaboration
      • Response Generation through ChatGPT on Report Chat
    • Competitions
    • Discord Community
    • Leaderboard
    • Multi-Factor Authentication
    • Settings
      • Verify KYC
    • Email Alias
    • πŸš€Apollo Community
  • Integrations
    • πŸ”—Supported Integrations
    • Webhooks
    • JIRA
      • Creating a JIRA Issue
    • Slack
      • Managing Integration
    • Microsoft Teams
    • Github
    • Asana
    • Sumo Logic
    • PagerDuty
  • on-premise
    • Running Automated Testing
    • Sandbox Environment
Powered by GitBook
On this page

Was this helpful?

  1. on-premise

Running Automated Testing

BugBase includes an automated vulnerability detection tool called BATS (BugBase Automated Testing Suite) to identify common security vulnerabilities.

Features

  • Automated Scanning: Schedule scans to run automatically on your assets at regular intervals.

  • Comprehensive Reporting: Receive detailed reports outlining identified vulnerabilities, their severity, and recommended mitigations.

  • Customizable Scans: Tailor scanning parameters to suit the specific needs of your assets.

Getting Started

1. Accessing BATS

  • Log in to your Bugbase dashboard.

  • Navigate to the 'Assets' section.

2. Setting Up Your Assets

  • Click on 'Manage Assets' to input or update the list of assets you want the scanner to analyze. This can include IP addresses, domain names, and other relevant identifiers.

Running a Scan

1. Configure Scan Settings

  • Select the assets you wish to scan from your list.

  • Choose the type of scan from the available list of scans.

2. Start the Scan

  • Once the assets and settings are configured, click on β€˜Start Scan’.

  • You can monitor the progress in the 'Scan Status' section.

Reviewing Scan Results

  • After the scan completes, go to the 'Reports' section to view the results.

  • The report will detail:

    • Vulnerabilities Found: Listing each vulnerability with its description.

    • Severity Ratings: Indicating the urgency of addressing each issue.

    • Remediation Steps: Offering guidance on how to resolve vulnerabilities.

Best Practices

  • Regular Scans: Schedule regular scans to continually assess the security of your assets.

  • Prompt Remediation: Act swiftly on the recommendations provided in the scan reports to mitigate risks.

  • Asset Management: Keep your asset list updated to ensure all critical assets are regularly scanned.

Troubleshooting and Support

  • If you encounter any issues with the scanner or have questions about your scan results, please contact Bugbase support for assistance.

PreviousPagerDutyNextSandbox Environment

Last updated 1 year ago

Was this helpful?