Both Acunetix Web Vulnerability Scanner and Acunetix Online Vulnerability Scanner provide options for selecting specific types of vulnerability checks to run against your site, such as SQL injection or Cross-Site Scripting checks. This can be done by selecting one of a number of predefined Scanning Profiles. Each Scanning Profile is a logical grouping of scripts […]
Since I first got involved with information security I’ve been a strong proponent of focusing on the common sense basics. We all know what needs to be done yet I see fundamental web security problems in practically every assessment I perform. From passwords to patches to input validation and beyond, there’s so much out there […]
Among many advanced penetration testing tools provided, Acunetix Web Vulnerability Scanner (WVS) offers you the HTTP Sniffer tool. With the HTTP Sniffer you can capture, trap, analyze and even modify any HTTP traffic that the sniffer is listening to, e.g. port 8080. The Acunetix HTTP Sniffer is a combination of a proxy server and a […]
When you install WordPress your default administrator username will be ”admin”, unless you specify another name. By logging into your WordPress admin account you have full permissions to access the WordPress directories and dashboard, meaning that you can control your entire website. If you don’t change your default WordPress admin username, a hacker can easily break into […]
Since the end of 2004, the US National Vulnerability Database has recorded 389 types of WordPress issues and vulnerabilities. With more than 73 million websites, WordPress has become one of the most preferred exploitation destinations for hackers across the globe. While WordPress has been continuously releasing new versions that loop up the security holes, its […]
Looks like the Mac is finally getting what’s been coming: malware. And lots of it just recently with the Flashback infection that apparently impacted up to 700,000 Macs. We’ve all heard it from the Mac bigots: One of the main reasons I use a Mac is because of all those viruses and junk on Windows. […]
Web Application Firewalls (WAFs) are an excellent last line of defense. Based on what I see in my testing they’re great at blocking both automated scans and granular exploits like Cross-Site Scripting and SQL injection. I recommend WAFs to clients all the time. But…there’s more to the story.
We are pleased to announce an updated build of Acunetix Web Vulnerability Scanner 8 (WVS 8). Build number 20120508 includes a number of new scheduler features, a new security check for PHP-CGI, as well as a series of bug fixes.
In order to save time scanning websites, you can run multiple instances of Acunetix Web Vulnerability Scanner, where each instance would run one scan. Depending on the type of license that you own, you can either run up to 2, 5, or 10 concurrent scans at the same time. This allows you to scan numerous […]
The WordPress database is the most important component of your WordPress website. It contains all the content of your website, such as information about your users and all your posts, etc. In order to access the database, a database user should have specific privileges that allow him or her to manipulate it. The WordPress database […]