Google Hacking Explained

Web Security Vulnerabilities Exposed by Google Searches (Google Hacking)

Google Hacking is a hacking technique used by hackers to identify web security vulnerabilities on web applications or gather information for general or individual targets. Mostly this information includes configuration and source code files, sensitive data, database information, etc. This … [+]

National Weather Service Hacked

National Weather Service Hacked

The National Weather Service has been hacked by the Kosova Hacker’s security group, leading to sensitive server information being leaked. The group managed to hack into the server using a Local File Inclusion (LFI) vulnerability in the weather.gov website. … [+]

How to Scan a Shopping Cart with an Automated Security Scanner

How to Scan a Shopping Cart with an Automated Security Scanner

Many of today’s large scale websites are template based. This means that most of the website pages which users visit are usually built from the same template file. Thus it is normal for a template based websites to be made … [+]

Over 1 Million Accounts Leaked in a Massive Hack Attack

Over 1 Million Accounts Leaked in a Massive Hack Attack

A recent online attack from a hacker group called Team GhostShell has targeted more than 100 websites from banks, stock exchange, police departments, and consulting firms, to law firms, and several companies from many other different sectors. Some of the … [+]

What Exactly Are the “Session-in” and “Session-out” Patterns?

What Exactly Are the “Session-in” and “Session-out” Patterns?

Acunetix Web Vulnerability Scanner (WVS) uses “session-in” and “session-out” patterns in order to detect if a logged in session on your website is invalidated and if need to be re-established. Acunetix WVS uses the recorded login sequence defined by the … [+]

FAQ: How can I copy My Scanning Profiles from One Computer to Another?

FAQ: How can I copy My Scanning Profiles from One Computer to Another?

An Acunetix Web Vulnerability Scanner Scanning Profile defines which tests to launch against the target website. For example, if you wish to test a website against Cross-Site Scripting (XSS) vulnerabilities, simply select the XSS Scanning Profile. You can also create a … [+]

6.5 Million LinkedIn Hacked Passwords

6.5 Million LinkedIn Hacked Passwords

LinkedIn, one of the biggest professional social networks, has suffered a major breach of its user password database. The attack was confirmed on Wednesday afternoon by Vicente Silveira, Director at LinkedIn, and was followed by an apology to the affected … [+]

Can I Have Different Web Scanning Profiles?

Can I Have Different Web Scanning Profiles?

Acunetix Web Vulnerability Scanner ( WVS ) offers you the ability to choose specific types of attacks to run against your site, such as SQL injection or Cross-Site Scripting attacks. You can select the desired attacks and save them as different Web … [+]

Using Acunetix Web Vulnerability Scanner as a Proxy Server

Using Acunetix Web Vulnerability Scanner as a Proxy Server

Among many advanced penetration testing tools provided, Acunetix Web Vulnerability Scanner (WVS) offers you the HTTP Sniffer tool. With the HTTP Sniffer you can capture, trap, analyze and even modify any HTTP traffic that the sniffer is listening to, e.g. … [+]