What is Code Injection?

Code Injection, or Remote Code Execution (RCE) refers to an attack where in an attacker is able to execute malicious code as a result of an injection attack. Code Injection differs from Command Injection since an attacker is confined to the limitations of the language executing the injected code. While it’s possible for an attacker […]

Read More →

What is a Host Header Attack?

It is common practice for the same web server to host several websites or web applications on the same IP address. This why the host header exists. The host header specifies which website or web application should process an incoming HTTP request. The web server uses the value of this header to dispatch the request […]

Read More →

What is Local File Inclusion (LFI)?

Local File inclusion (LFI), or simply File Inclusion, refers to an inclusion attack through which an attacker can trick the web application in including files on the web server by exploiting functionality that dynamically includes local files or scripts. The consequence of a successful LFI attack includes Directory Traversal and Information Disclosure as well as […]

Read More →

What is Remote File Inclusion (RFI)?

Remote File inclusion (RFI) refers to an inclusion attack wherein an attacker can cause the web application to include a remote file by exploiting a web application that dynamically includes external files or scripts. The consequences of a successful RFI attack include Information Disclosure and Cross-site Scripting (XSS) to Remote Code Execution. Remote File Inclusion […]

Read More →

What are Injection Attacks?

Injection attacks refer to a broad class of attack vectors that allow an attacker to supply untrusted input to a program, which gets processed by an interpreter as part of a command or query which alters the course of execution of that program. Injection attacks are amongst the oldest and most dangerous web application attacks. […]

Read More →

How to scan an HTTP Authentication restricted area

In addition to support for form authentication, which Acunetix supports via the Login Sequence Recorder, you can also scan areas of a website or web application which are restricted through the means of HTTP Authentication. HTTP Authentication, sometimes referred to as Basic Authentication, is a type of authentication that is formally defined in the HTTP […]

Read More →

Acunetix receives highest score for “Penetration Testing” Use Case

Gartner’s 2017 Critical Capabilities for Application Security Testing Report Gartner, Inc., the leading provider of research and analysis on the global information technology industry, has recognised Acunetix as a Challenger in February 2017 Magic Quadrant for Application Security Testing (AST), and has given Acunetix the highest score out of 18 AST solution providers, in the […]

Read More →

Configuring Advanced Settings in Acunetix

By default, Acunetix comes built-in with settings that are designed to work in the vast majority of websites and web applications. Of course, you can customize a Target’s settings, but there might be cases where you need very fine-grain control on your Target settings. Fine-grain scan controls can be customized from the Acunetix Settings.xml file […]

Read More →