Black Box vs White Box

Black box (external only)

Tests your application from the outside, like an attacker would. No access to source code.

Tools included (11):

ToolCategoryWhat it tests
NmapNetworkOpen ports, services, versions
OWASP ZAPWeb appXSS, injection, CSRF, misconfigurations
NucleiWeb appKnown CVEs, misconfigurations, exposures
NiktoWeb appDangerous files, outdated server software
FFUFWeb appHidden directories, backup files
OpenVASVulnerabilityFull network vulnerability assessment
TestSSLSSL/TLSCertificate issues, weak ciphers, protocol vulnerabilities
SubfinderReconSubdomain enumeration
HTTPXReconHTTP response probing, tech detection
Wafw00fReconWAF detection and fingerprinting
PentestToolsMultiAdditional vulnerability checks

When to use: You do not have a GitHub repository, or you only want to test the external attack surface.

White box (external + code analysis)

Everything in black box, plus static analysis of your source code via GitHub.

Additional tools (3):

ToolCategoryWhat it tests
SemgrepSASTCode-level vulnerabilities, insecure patterns
TrivySCAVulnerable dependencies in package files
GitleaksSecretsHardcoded API keys, tokens, passwords in code

Requirements:

  • GitHub repository connected via OAuth or GitHub App
  • Repository access granted to TurboPentest

When to use: You have a GitHub repository and want comprehensive coverage including code-level vulnerabilities that cannot be found from outside.

Setting up GitHub access

See GitHub Connection for setup instructions.

On this page