Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

Author Archives Ian Muscat

THE AUTHOR
Ian Muscat
Ian Muscat

Ian Muscat used to be a technical resource and speaker for Acunetix. More recently, his work centers around cloud security and phishing simulation.

Getting Started with the Acunetix Authentication Tester

Product Articles | February 14, 2017 by Ian Muscat

The Authentication Tester is a tool that forms part of the Acunetix Manual Pen Testing Tools suite (available to download for free). The Authentication Tester allows you to test the strength of credentials used in HTTP authentication, as well as custom HTML form-based authentication by…

Read more

Getting Started with the Acunetix Target Finder

Product Articles | January 25, 2017 by Ian Muscat

The Target Finder is a tool that forms part of the Acunetix Manual Tools suite (available to download for free). The Target Finder allows you to run a port scan to discover web servers running on a given IP address, or a range of IP…

Read more

Getting Started with the Acunetix Subdomain Scanner

Product Articles | January 18, 2017 by Ian Muscat

The Subdomain Scanner is one of the tools in the Acunetix Manual Tools suite for penetration testers. The Acunetix Manual Tools Suite is a set of tools for penetration testing, ethical hacking, and attack surface information gathering. The tools are free for commercial use but…

Read more

Getting Started with the Acunetix HTTP Sniffer

Product Articles | January 10, 2017 by Ian Muscat

The HTTP Sniffer is one of the tools among the Acunetix Manual Tools suite (available to download for free). The HTTP Sniffer is a proxy that allows you to analyze HTTP requests and responses, and manually crawl a site structure. The HTTP Sniffer can also…

Read more

Getting Started with the Acunetix HTTP Fuzzer

Product Articles | January 9, 2017 by Ian Muscat

The HTTP Fuzzer is one of the tools in the Acunetix Manual Tools suite designed to let you manually test for security issues. The Acunetix Manual Tools Suite is a set of tools for black-box testing and application security information gathering. These security vulnerability testing…

Read more

Getting Started with the Acunetix HTTP Editor

Product Articles | January 9, 2017 by Ian Muscat

The HTTP Editor is one of the most flexible and widely used tools among the Acunetix Manual Tools suite (available to download for free). The HTTP Editor allows you to create, analyze, and edit client HTTP requests; as well as inspect server responses. It also…

Read more

33% of websites and webapps are vulnerable to XSS

Web Security Zone | September 7, 2016 by Ian Muscat

Cross-site Scripting (XSS) is a much talked-about type of injection vulnerability that occurs on the client-side (that is, in a user’s browser). It occurs, predominantly through the use of JavaScript due to its prevalence in most browsing experiences. Cross-site Scripting can be classified into four…

Read more

SQL injection slowly receding, but still a major concern

Web Security Zone | September 1, 2016 by Ian Muscat

SQL injection (SQLi) is a frequent topic on this blog – it refers to an injection attack that allows an attacker to execute malicious SQL statements that allow the attacker to control a web application’s database server. Since an SQL injection vulnerability could possibly affect…

Read more

Hunting for XXE in Uber using Acunetix AcuMonitor

Web Security Zone | August 11, 2016 by Ian Muscat

XML External Entity (XXE) vulnerabilities are attacks which involve an attacker abusing an application which parses XML. The attack occurs against an XML parser which has XML entities enabled. If you are not familiar with XML entities, you can think of them as a rarely…

Read more

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • …
  • 10
  • 4 / 10
Subscribe by Email

Get the latest content on web security in your inbox each week.

We respect your privacy

Learn More
  • IIS Security
  • Apache Troubleshooting
  • Security Scanner
  • DAST vs SAST
  • Threats, Vulnerabilities, & Risks
  • Vulnerability Assessment vs Pen Testing
  • Server Security
  • Google Hacking
Blog Categories
  • Articles
  • Web Security Zone
  • News
  • Events
  • Product Releases
  • Product Articles

Take action and discover your vulnerabilities

Get a demo
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti