DAST tools probe live applications like an attacker would, sending malicious inputs and analyzing responses.
What DAST detects
- Injection vulnerabilities (SQL, command, LDAP).
- Authentication and session management flaws.
- Server misconfigurations.
- Sensitive data exposure in responses.
- Missing security headers.
- Cross-site scripting (reflected).
Popular DAST tools
- Commercial: Burp Suite Enterprise, Invicti, Rapid7 AppSpider.
- Open source: OWASP ZAP, Nuclei, Nikto.
CI/CD integration
- Run against staging/test environments.
- Schedule full scans nightly or weekly.
- Quick scans on every deployment.
- API-first scanning for modern applications.
Advantages
- Tests the actual running application.
- Finds configuration and deployment issues.
- Technology-agnostic (tests any web application).
- Discovers issues SAST cannot find.
Limitations
- Cannot scan code paths not exposed via UI/API.
- Requires running application (later in pipeline).
- May miss vulnerabilities behind authentication.
- Can generate significant traffic/load.
Best practices
- Maintain authenticated scan profiles for full coverage.
- Use API definitions (OpenAPI/Swagger) for API scanning.
- Exclude rate-limited endpoints to avoid lockouts.
- Correlate with SAST findings for validation.
- Run in isolated test environments to avoid data corruption.
Related Articles
View all articlesVulnerability Management & Patch Prioritization Workflow
Master the complete vulnerability management lifecycle with risk-based patch prioritization. From discovery to remediation, learn how to protect your infrastructure before attackers strike.
Read article →Penetration Testing Methodology Workflow | Complete Pentest
Master the complete penetration testing lifecycle from pre-engagement to remediation validation. Learn PTES framework, ethical hacking methodology, vulnerability exploitation, and post-exploitation techniques with practical tools and industry best practices.
Read article →CI/CD Pipeline Security Workflow | DevSecOps Best Practices
Master the complete CI/CD pipeline security workflow from secrets management to SLSA framework implementation. Implement SAST, DAST, SCA, artifact signing, and policy enforcement to secure your software supply chain.
Read article →Shellcode Analysis for Security Researchers: A Complete Guide
Master the fundamentals of shellcode analysis with this comprehensive guide covering common patterns, encoding techniques, analysis tools, and step-by-step methodologies for security researchers and CTF players.
Read article →Explore More DevSecOps
View all termsContainer Image
A lightweight, standalone, executable package containing everything needed to run an application: code, runtime, libraries, and settings.
Read more →Container Registry
A repository for storing, managing, and distributing container images, providing version control and access management.
Read more →Immutable Infrastructure
An infrastructure paradigm where servers are never modified after deployment; changes require replacing instances with new ones built from updated images.
Read more →Infrastructure as Code (IaC)
Managing and provisioning infrastructure through machine-readable configuration files rather than manual processes.
Read more →Policy as Code
Defining and enforcing security, compliance, and operational policies through code that can be versioned, tested, and automated.
Read more →Runtime Security
Monitoring and protecting applications during execution to detect and prevent attacks in real-time.
Read more →