How to Set Up an Invasive "Full Scan"?

For our invasive scanners, you need to confirm that you can access the application - by uploading a text file to the root directory of the URL.

This section only applies when you choose the "Full Scan"-Scope during the setup process.

Screenshot 2020-04-02 at 14.32.24

Before starting our scanners, you need first to verify that the application belongs to you - by uploading a text file to the root directory of the URL.
You will see the lock if you need to verify the project. Otherwise, you will see the start scan.

Screenshot 2020-04-02 at 14.34.03
This is necessary to validate that you have access rights to the domain and are legally allowed to perform security scans.

How to Verify

There are three possible ways to verify a project:

  1. File Upload
  2. API Endpoints
  3. Manual Verification (only in the professional package)

Screenshot 2019-10-24 at 10.57.46

File Upload

To verify a project via file upload, you must download the verification file (a .html file). This file contains a unique and secure hash. Upload the file to be available under the root directory of the URL you entered when creating the project. Your project setting displays your specific path (see screenshot below).
After you have uploaded this file, you can initiate the Verification. Afterward, your project is ready to scan.Screenshot 2020-04-02 at 14.35.59

API Endpoints

To verify using API endpoints, update your API to include any of the following GET statements. (replace "" with your API domain and "XXXXX" with your specific value that you can retrieve from the software) 


Any API endpoints listed above should return the project verification hash, which you can copy into the software.

Manual Verification

Get in touch with our customer support if the automatic verification options are not possible for you. We will help you to verify your project.

If your project is protected by HTTP Basic Authentication (htaccess protection), you need to configure the username and password in the project settings before trying to verify the project.

For more information about Crashtest Security, visit