While scanning certain web applications, you might need to configure Acunetix WVS to crawl a web page — such as a shopping cart — in a predefined way. To do so, you need to record a login sequence using the Login Sequence Recorder. The following procedure explains how this is done: 1. From the Configuration […]
Acunetix WVS offer command-line support, which provides similar functionality and is an easy way to integrate Acunetix WVS with other third party applications. If you wish to run the Acunetix WVS console application then you can run ‘wvs_console.exe’ from the Acunetix WVS installation directory. In case you wish to generate a report using the command-line support […]
Acunetix WVS is designed to perform a web security scan by using a web application as an exploitable front-end, through which it can make contact with a web server. This approach ensures that WVS does not rely on specific compatible web-servers or web technology for a scan to be executed. Some checks — which Acunetix […]
This brief presentation highlights the new exciting features of Acunetix Web Vulnerability Scanner Version 8. We look forward to your comments.
Blog security is a hot topic among today’s online community. If you own a blog, you want a regular supply of visitors and it’s up to you to keep them safe. Some people panic when they find technical security solutions which they can’t understand; but what they fail to grasp is that a secure website […]
Acunetix Web Vulnerability Scanner 8 stores application settings, scan results and configuration information in different files and directories. These are divided in three categories: Data directory, Application directory, and Scheduler Saves directory. You can browse to them from the main toolbar drop down menu WVS Help > Application Directories. Data is the first application directory, […]
Note: This is no longer available. Click here to download a 14-day free trial of the latest version of Acunetix. The next stage in the evolution of Acunetix Web Vulnerability Scanner has arrived — WVS 8 BETA! Many of you have been biting their nails in anticipation of this Beta, so sit tight and read […]
On the 5th of December 2011, the Pittsburgh chapter of ISACA will be hosting a one-day “Information Technology Audit & Control” Conference; with Acunetix reseller Jacadis — specialists in network and web security — as one of the gold corporate sponsors for the event aimed at IT auditors, network administrators, and security administrators.
I recently read about a marketing agency that experienced a security breach and subsequent defacement of its customers’ websites. Apparently their developers had misconfigured the web server and unknowingly gave the whole world access to change any and all content at will. What interested me the most was the fact that out of the hundreds […]
Many organizations have a formal set of information security policies covering everything from acceptable internet usage to security in software development to web application security. In fact, it’s hard to come across a business today that doesn’t have at least a policy or two in place. That’s fine and dandy but it’s not the existence […]