Session IDs are a tasty treat for malicious hackers. Once an attacker gets their hands on a session ID, they can get unauthorized access to a web application and fully impersonate a valid user. In general, there are three primary methods to obtain a valid…
What’s New in Acunetix v13
Check out what’s new in Acunetix v13. This brief presentation highlights the following features: Full integration with a network scanner for comprehensive vulnerability management Malware scanning using Windows Defender or ClamAV The revolutionary SmartScan engine – find up to 80% vulnerabilities in the first 20%…
Acunetix v13 Release Introduces Groundbreaking Innovations
London, United Kingdom – February 5, 2019 – Acunetix, the pioneer in automated web application security software, has announced the release of Acunetix Version 13. The new release comes with an improved user interface and introduces innovations such as the SmartScan engine, malware detection functionality,…
What Are HTML Injections
HTML injections (HyperText Markup Language injections) are vulnerabilities that are very similar to Cross-site Scripting (XSS). The delivery mechanisms are exactly the same but the injected content is pure HTML tags, not a script like in the case of XSS. HTML injections are less dangerous…
XSS Filter Evasion Basics
The two primary methods of avoiding Cross-site Scripting (XSS) vulnerabilities are XSS filtering and XSS escaping. However, XSS filtering is not recommended because it can usually be evaded using clever tricks. Here are some of the methods that an attacker can employ in their malicious…
How to Use Allowed Hosts
When you build web applications, you often use multiple back-end web services to interface between client-side and server-side applications. For example, enterprises use functional subdomains to distribute static content or application logic between API requests. To scan the entire web application, the web vulnerability scanner…
What Is Cookie Poisoning
The term cookie poisoning is used in different contexts to describe attacks that aim to manipulate, intercept, or forge the content of HTTP cookies. Cookie poisoning attacks are different types of attacks that can affect both the client-side application, data transmission, or the web server….
How and Why to Avoid Unvalidated Redirects and Forwards?
Unvalidated redirects and forwards cannot harm your website or web application but they can harm your reputation by helping attackers lure users to malware sites. If you allow unvalidated redirects and forwards, your website or web application will most probably be used in phishing scams….
Visit Us at RSA Conference 2020
Acunetix will be exhibiting at the RSA Conference 2020 on February 24–28 in San Francisco. Join us at booth #6365 in the North Expo to find out about the latest automated features of Acunetix, the leader in web application security scanning. You can click here…