FAQ: I’m worried that a live directory or file might be risky to scan in realtime. What can I do?

Acunetix WVS features a directory and file filter which allows you to safely exclude specific URLs or directories from the scan. To create a directory filter: In the Tools Explorer, click ‘Configuration’ and then click ‘Settings’ in the main panel. In the Application Settings panel, click ‘Directory and File Filters’. Use the ‘+’ and ‘-‘ […]

Read More →

FAQ: How does the file type filtering system work?

Acunetix WVS can safely ignore certain file types which cannot be exploited by a hacker, and therefore cannot be considered as vulnerable. By ignoring these files types a scan will take less time to complete, and will be more efficient in its test executions. The file extension filter in the Acunetix WVS settings already contains […]

Read More →

Suggest ideas and participate in the evolution of Acunetix WVS

Since its conception in 2005, Acunetix Web Vulnerability Scanner has provided a comprehensive set of security analysis tools to countless web designers, administrators, and consultants around the world; and has successfully protected thousands of web applications from the ever-present threat of hackers. Over the years, the numerous customers and testers of WVS have contributed priceless […]

Read More →

Using Acunetix HTTP Editor Tool

In this video we focus on the advanced penetration testing tool, HTTP Editor Tool, that is bundled with Acunetix Web Vulnerability Scanner. We begin by hacking a website using a source code disclosure vulnerability that was discovered using Acunetix Web Vulnerability Scanner and proceed to explain how we did the hack and how the HTTP […]

Read More →