Scan & Template Configurations
Configure custom scan settings, HTTP headers, template variables, and template profiles
Overview
ProjectDiscovery’s scanning engine supports various configuration options to customize scan behavior and template execution. This includes HTTP headers, template variables, interactsh settings, and template profiles. Some templates, particularly those requiring authentication or specific parameters, need additional configuration to work effectively in the cloud platform.
Scan Configurations
HTTP Headers
Configure custom HTTP headers that will be included in all scan requests. This is useful for:
- Adding authentication tokens
- Setting specific User-Agent strings
- Including custom tracking headers
- Passing required API keys
Template Variables
Define variables that templates can reference during execution. Common use cases include:
- Authentication credentials
- API tokens
- Custom parameters
- Environment-specific values
Interactsh Settings
Configure out-of-band (OOB) testing parameters:
- Custom Interactsh server settings
- Correlation timeout values
- Callback configurations
Authentication Example
Let’s look at a practical example using WordPress authentication, which is required by over 150 different Nuclei templates.
Here’s a template that requires authentication parameters:
This template uses two undefined variables ({{username}}
and {{password}}
). While in CLI you would use:
In ProjectDiscovery Cloud, we need to configure these through the scan configuration interface.
Setting Up Scan Configurations
Creating a New Configuration
Access Configuration Settings
- Navigate to Scans → Configurations
- Select “Scan Options”
- Click “New Config”
Basic Configuration
- Enter a descriptive name (e.g., “WP Authentication”)
- Choose configuration type:
- HTTP Headers
- Template Variables
- Interactsh Settings
Add Parameters
For template variables:
- Add key-value pairs (e.g., username: admin)
- Set scope (global or template-specific)
- Configure visibility settings
For HTTP headers:
- Specify header name and value
- Set application conditions
Configure Application Scope
- Choose when to apply this configuration:
- Enable for all scans (global)
- Manual selection per scan
- Set template matching criteria (optional)
Template Profiles
Create custom template collections based on:
- Severity levels (Critical, High, Medium, Low)
- Tags (wordpress, cve2023, authenticated, etc.)
- Protocol types (HTTP, DNS, TCP, etc.)
- Template IDs
To create a template profile:
- Navigate to Scans → Configurations → Template Profiles
- Click “New Profile”
- Select filtering criteria
- Save and name your profile
Advanced Configuration Examples
WordPress Authentication
Custom Headers
Interactsh Configuration
Best Practices
-
Security Considerations
- Use environment variables for sensitive values
- Implement least-privilege access
- Regularly rotate credentials
- Audit configuration usage
-
Performance Optimization
- Group related configurations
- Use template-specific variables when possible
- Monitor configuration impact on scan times
-
Maintenance
- Document configuration purposes
- Review and update regularly
- Remove unused configurations
- Test changes before production use
When using authentication credentials or sensitive parameters, ensure they are stored securely and accessed only by authorized users. Consider using environment variables or secure credential storage for sensitive values.
What’s Next?
After setting up configurations:
- Create new scans using your configurations
- Monitor scan results for proper parameter usage
- Adjust configurations based on results
- Create template profiles for specific use cases
For template development guidance, visit our Template Editor documentation.
Was this page helpful?