Run dynamic application security testing (DAST) on Polaris
With Polaris fAST Dynamic, you can perform rapid, self-service DAST scans of web applications and APIs. Issues found in DAST scans can be viewed alongside SAST and SCA issues, and triaged according to their severity.
About DAST
Prerequisites
Before you begin, make sure that:
- Your organization has a subscription with a DAST entitlement.
- Your subscription has at least one available DAST project.
- An Organization Admin or Organization Application Manager has either:
- Created an application that uses your DAST subscription.
Note: See Create an application for more information.
- Assigned your DAST subscription to a preexisting application.
Note: See Assign subscriptions to applications for more information.
- Created an application that uses your DAST subscription.
- Polaris has network access to the web
application or API you wish to scan. To run DAST tests, Polaris communicates with your web-accessible
applications or APIs using IPs that vary between Polaris instances.
Table 1. fAST Dynamic (DAST) IPs Polaris instance IPs (outbound) America, production - 192.231.134.0/24
America, POC European Union, production - 162.244.5.0/24
- If you want to scan internal web applications or APIs which are inside a private network, you have installed the Black Duck Bridge CLI (version 3.1.0 or higher).
- You have permissions to create and manage projects.
Note: See Roles and permissions for more information.
About active attacks
If you select the Perform Active Attacks checkbox when creating a DAST project, fAST Dynamic will simulate real-world attacks by sending various inputs and then observing the application's or API's behavior.
Create a DAST project
- Web applications
- APIs
A target is identified by its Entry Point URL and can be Internet-accessible or internal (inside a private network). A separate DAST profile is needed for each target you want to scan with fAST Dynamic. A single DAST project can be used for testing a web application or an API target, but not both.
Create a DAST project for a web application target
- The Entry Point URL is valid.
- Polaris can connect to the web application
and authenticate, if applicable.
A message is displayed if the connection test was successful:
Create a DAST project for an API target
Test an internal web application or API with Polaris Secure Tunnel
Dynamic testing of an internal web application or API (an internal target) requires a secure connection between Polaris and your private network. With the Polaris Secure Tunnel feature of the Black Duck Bridge CLI, you can establish a secure TLS connection directly to the target in your internal environment, without the need to open any ports or allowlist our IP ranges.
Polaris Secure Tunnel uses the Teleport Access Platform for internal app connectivity. Teleport functionality is integrated with the Bridge CLI and requires no account setup or installation.
It's straightforward to connect to an internal target using Polaris Secure Tunnel:
- Sign in to the Polaris user interface.
- First, create a DAST project for a web application or API, making sure to select the Entry Point URL is in a private network option on the new project page. This creates an internal target with the Teleport configuration required for connectivity via Polaris Secure Tunnel.
- Create an access token in Polaris.
- Download the Bridge CLI.
- To connect to the internal target you created, follow the steps in Connect to an internal DAST target from the Bridge CLI in the Bridge CLI documentation.
- Teleport establishes a secure tunnel on port 443 between Polaris and your private network. Important: Leave the Polaris Secure Tunnel session running in your terminal until your testing is complete.
- (Optional) Go to and then run a connection test on the internal target.
- Run a DAST test on the internal target in the usual way, either from the Polaris user interface or via the API.
- When the test is complete, stop the Polaris Secure Tunnel session in your terminal, or leave the connection open for further DAST tests on the same target.
- You can view DAST issues found on internal web applications and APIs in the
Polaris user interface.Note: Only one secure tunnel will be used for a Polaris project at a time. While you leave a Polaris Secure Tunnel session open, other tests for the configured Polaris project will be routed through that same secure tunnel.
Test a DAST project
Follow these steps to run a DAST test from the Polaris user interface:
Work with DAST issues
Issues captured in DAST tests are managed like SAST and SCA issues. You can:
- Triage DAST issues (and manually apply fix-by dates). See Ways to triage issues in Polaris.
- Assign issue policies to DAST projects to automate actions when issues are captured in tests. See Issue policies.
- Export DAST issues to CSV or JSON. See How to export issues to CSV or JSON.