If a potential weakness/vulnerability is found, you can use the script to run the same attack to see the behavior of the DUT (this is especially helpful during the remediation process). Once the script is saved, you can edit the script for continued testing on the user end.   


beSTORM has a built-in option built that allows you to export attacks that are used as Perl or Python scripts. To export these scripts, do the following:

  1. Open beSTORM Clent.
  2. Select New Project or load an existing project.
  3. From the Module Browser pane, select the attack vector to export.
  4. Select Export.
  5. In the Save as type box, select Python3 Files or Perl Files.
  6. Select Save.




Example Phyton script for an attack vector in the HTTP (Simple Web Client) Module.