Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

INTERACTIVE APPLICATION SECURITY TESTING WITH

AcuSensor Technology

Get a demo
Gartner Peer Insights Reviews

Interactive Application Security Testing (IAST) with AcuSensor

The AcuSensor technology is an additional component of Acunetix. When you install and use AcuSensor, Acunetix becomes an IAST solution (grey-box scanner), not just a DAST scanner (black-box scanner). AcuSensor works with applications written in Node.js, PHP, Java (including the Spring framework), and ASP.NET.

Scan every file — even hidden ones

Most scans miss unlinked and hidden files because crawlers can’t see them. By deploying the IAST sensor within your runtime environment, you’ll gain enhanced visibility into the backend of your web application — this encompasses information about the files utilized by the web application as well as the routing within it. When web API routing is present, you can now discover APIs that are used by the web application.

With Acunetix, you can also import API definition files and links so you can perform tests on all your APIs that use a REST, SOAP, or GraphQL architecture.

Now, you can have confidence that every part of every page has been mapped and tested, which ultimately means bad actors have fewer ways to attack you.

v13 acusensor narrow screenshot

What Are the Benefits of AcuSensor?

When you use AcuSensor, Acunetix gets additional information from the server back end, at the time when Acunetix is scanning the web application. This additional information introduces a number of improvements.

  • Ease of remediation: AcuSensor connects to the code interpreter or compiler (depending on the language) and it can identify the exact line of source code (for PHP) or point to a location in a stack trace (for Java and ASP.NET). With this information, your developers can fix vulnerabilities much faster.
  • Greater precision: AcuSensor can detect the following vulnerability types with 100% confidence: SQL Injection, code injection, CRLF injection, directory traversal, arbitrary file creation/deletion, email header injection, file upload, file inclusion, file tampering, PHP code injection, and PHP SuperGlobals overwrite.
  • Full coverage: AcuSensor provides a full directory listing of the web application, ensuring that the entire web application is scanned, including any hidden, unlinked locations. Additionally, AcuSensor can discover hidden GET and POST inputs, even if these are not used within the web application.
AcuSensor diagram

How Does AcuSensor Work?

The Acunetix scanner works by sending payloads and analyzing responses. When the web server receives the payload, it executes back-end code. If AcuSensor is installed, it analyzes the executed back-end code and provides the scanner with additional information.

  • You must install AcuSensor on the server for the selected language. AcuSensor is available for Linux/UNIX and Windows servers.
  • AcuSensor works directly with the PHP interpreter as well as Java and ASP.NET bytecode compilers.
  • You do not need to modify your source code at all to use AcuSensor. This is a major advantage over IAST offerings that require you to compile sensors within your code, often requiring you to change your build process or add software dependencies to your project.
v13 acusensor zoom screenshot

When to Use IAST?

AcuSensor works best in specific environments and is not recommended for some of the others. To get the best out of AcuSensor, use it in the right environment.

  • You should install AcuSensor on your staging servers. This is the best place to perform IAST analysis.
  • You may install AcuSensor on virtual machines to perform IAST analysis as part of CI/CD pipelines. In this case, the AcuSensor installation would need to be done as part of the CI/CD pipeline.
  • We do not recommend installing AcuSensor on production servers. An active AcuSensor consumes some resources, so your production web applications may run slower.
  • AcuSensor is currently available for Node.js, PHP, ASP.NET, and Java. Let us know if you would like us to create an AcuSensor for your technology.

Recommended Reading

Learn more about prominent vulnerabilities, keep up with recent product updates, and catch the latest news from Acunetix.

icon_knowledge-2023

Knowledge Sharing

What is SQL Injection

What is Cross-site Scripting

What Are XML External Entity Attacks

What is Insecure Deserialization

icon_popular-2023

Popular Posts

SQL Injection Example

Preventing SQL Injection in PHP

TLS/SSL Cipher Hardening

Defending Against CSRF Attacks

icon_news-2023

In The News

Complimentary licenses – COVID-19

Interview with Acunetix President & COO

Innovations in Acunetix v13

xerox

“We use Acunetix as part of our Security in the SDLC and to test code in DEV and SIT before being promoted to Production.”

Kurt Zanzi, Xerox CA-MMIS Information Securtiy Office, Xerox

Take action and discover your vulnerabilities

Get a demo
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2025, by Invicti