ports-resized

How to Close Unused Open Ports

One of the checks done in a network scan by Acunetix Online Vulnerability Scanner (OVS) is a TCP and UDP port scan. Any open ports detected during the scan will be reported as shown in the screenshot. In this particular … [+]

Identify the Heartbleed Bug with Acunetix Vulnerability Scanner

Heartbleed – A Bigger Threat Than Meets the Eye

The Heartbleed Bug took the world by storm the moment the vulnerability became public. Heartbleed Bug is a serious vulnerability in the widely used OpenSSL cryptographic library. This weakness allows theft of data resident in the server’s memory, which generally … [+]

hour-glass-resized

How Response Time Affects a Scan’s Performance

One of the most common causes of a slow scan relates to a large response time between the scanner and the target website or web application. The average response time is an average of the total time it takes for … [+]

Acunetix Web Vulnerability Scanner v9, build 20131216 includes a new PCI 3.0 compliance report and several new tests

The Chronicles of DOM-based XSS

A brief overview of DOM-based XSS DOM-based XSS is a form of cross-site-scripting attack in which an attacker executes an attack vector through the modification of the browser’s Document Object Model (DOM) environment. Unlike stored (persistent) or reflected XSS variants, … [+]

Acunetix Web Vulnerability Scanner v9, build 20131216 includes a new PCI 3.0 compliance report and several new tests

Finding the Source of a DOM-based XSS Vulnerability with Acunetix WVS

DOM-based XSS involves the execution of a payload as a result of modifying the DOM inside the browser used by a client side script. Since the payload resides in the DOM, the payload may not necessarily be sent to the … [+]

Slow HTTP DoS Attacks and How to Mitigate Them in Apache HTTP Server

How To Mitigate Slow HTTP DoS Attacks in Apache HTTP Server

A Slow HTTP Denial of Service (DoS) attack, otherwise referred to as Slowloris HTTP DoS attack, makes use of HTTP GET requests to occupy all available HTTP connections permitted on a web server. A Slow HTTP DoS Attack takes advantage … [+]