Where can I find the Acunetix manual tools in v11?

In Acunetix v11, the manual tools, are being provided as a separate installation downloadable for free from http://www.acunetix.com/vulnerability-scanner/free-manual-pen-testing-tools/ The suite of Manual Tools include: HTTP Editor –  to create, analyze, and edit client HTTP requests; as well as inspect server responses. HTTP Sniffer – to analyze HTTP requests and responses, and manually crawl a site structure. HTTP Fuzzer – to automatically […]

Read More →

Getting Started with the Acunetix HTTP Fuzzer

The HTTP Fuzzer is one of the tools among the Acunetix Manual Tools suite (available to download for free). The HTTP Fuzzer is a tool which allows you to automatically send a large number of HTTP requests including invalid, unexpected and random data to a website, to test input validation and rate-limiting. You can start […]

Read More →

Getting Started with the Acunetix HTTP Editor

The HTTP Editor is one of the most flexible and widely used tools among the Acunetix Manual Tools suite (available to download for free). The HTTP Editor allows you to create, analyze, and edit client HTTP requests; as well as inspect server responses. It also includes an encoding and decoding tool to encode/decode text and […]

Read More →

I get a warning icon in the Status column of a scan. Where can I find more information on the warning?

When scanning a target, you might encounter a situation where the Status column of a scan shows a warning icon. This generally indicates that the scan completed, however Acunetix encountered a problem while running the scan. Clicking on the Scan will provide more information on what happened. The Activity section of the Scan Stats and […]

Read More →

How do I enable logging for a scan?

In the event where you need to troubleshoot the scanning done on a specific target, you can enable debug logging for the Target. The Acunetix scanner will log the progress of the scan and any problems that are encountered during the scan. You can enable debug logging for a Target by browsing to the Target’s […]

Read More →