You will need an Acunetix Online license for each website that you wish to protect. In this case, if you want to protect all 5 websites, you will need a 5 Target license.
Please contact our support team who will evaluate the situation and escalate accordingly.
The Target’s hostname or IP address cannot be altered once the Target is created. All the other Target options can be altered at any time.
Since Acunetix Online is licensed per Target, a Target can only be deleted prior to it being scanned. Once a Target has been scanned, it cannot be deleted – the deletion option will be greyed out.
A Target is a web site, web application, server or network device that you would like to scan for security vulnerabilities using Acunetix. What is a “Free Scan Target”? A “Free Scan Target” is a network server or device that can be configured in Acunetix Online and which can be scanned for network vulnerabilities. During […]
What is Universal Cross-site Scripting (UXSS)? Common cross-site scripting (XSS) attacks target websites or web applications that are vulnerable to XSS, because of inadequate development of client-side or server-side code. These attacks have the vulnerable web page as main prerequisite, and their effect is always revolving around the user session on the vulnerable web page […]
Web-based security threats are a popular topic and you can easily find related information, including on cross-site scripting and one of its important flavors, Blind XSS. However, although this information is usually delivered at a high level of detail, the description of the possible targets of such an attack is quite slim and commonly refers […]
MALTA, March 6, 2014 — Acunetix today announced the launch of Online Vulnerability Scanner. Combining the benefits of an online solution with Acunetix’ advanced scanning and crawling technology, Acunetix OVS is meant for businesses of any size that want to protect their critical websites, web applications and web servers from potential hacking attacks. The need […]
Hackers exploit vulnerable systems – and unprepared individuals – to access trade and commercial secrets, damage or gain control of national assets of strategic importance, publicly embarrass top brands, and wreak general havoc with considerable financial, social and economic repercussions. Yet, notwithstanding the barrage of alarming statistics coming our way and the plethora of tools […]
A brief overview of DOM-based XSS DOM-based XSS is a form of cross-site-scripting attack in which an attacker executes an attack vector through the modification of the browser’s Document Object Model (DOM) environment. Unlike stored (persistent) or reflected XSS variants, DOM-based XSS does not involve the attack payload being placed in the server response. As […]