You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While testing issues, I launched a Vuln scan on testphp.vulnweb.com.
It contains DalFox in the default Full Scan Engine.
It runs for more than 1h30 and it did not finish yet.
I try top stop scan, Dalfox continues.
So we need to test this part and look for the problem.
Maybe we should remove those long waiting scan to leave the user make a choice.
Or we should set a less resource intensive default config for Dalfox, which catch result faster
Expected Behavior
Dalfox should run fast and should stop when aborted from GUI
Steps To Reproduce
Run vulnerability scan contained in the Full Scan default engine
Beware of the target !!!
Is there an existing issue for this?
Current Behavior
While testing issues, I launched a Vuln scan on testphp.vulnweb.com.
It contains DalFox in the default Full Scan Engine.
It runs for more than 1h30 and it did not finish yet.
I try top stop scan, Dalfox continues.
So we need to test this part and look for the problem.
Maybe we should remove those long waiting scan to leave the user make a choice.
Or we should set a less resource intensive default config for Dalfox, which catch result faster
Expected Behavior
Dalfox should run fast and should stop when aborted from GUI
Steps To Reproduce
Run vulnerability scan contained in the Full Scan default engine
Beware of the target !!!
Environment
Anything else?
To end Dalfox task, you need to find the root celery process id and kill it using root user.
The text was updated successfully, but these errors were encountered: