Automated Penetration Testing ToolIf you work as a pen tester or ethical hacker, Acunetix can help you in several ways, depending on your requirements and workload.
- You can run Acunetix manually before beginning a penetration test to find common web application vulnerabilities such as SQL Injections, Cross-site Scripting (XSS), and more (including most OWASP Top-10 vulnerabilities as well as misconfigurations).
- If you don’t want to rely on automatic testing, you can use the Acunetix engine to crawl the web application and map its entire structure. You may then manually test the discovered structure.
- You can also use Acunetix to assess the state of your network security. Acunetix is integrated with OpenVAS and includes network vulnerabilities in its interface and reports.
More Than Web Vulnerability ScanningAcunetix started out as a simple vulnerability scanner but grew into a full-fledged vulnerability assessment and vulnerability management solution with extensive integration options including an API that you can use to build your own integrations.
- You can set up Acunetix to work in real-time within your SDLC. For example, an Acunetix scan can be triggered by Jenkins with every build.
- Acunetix can be used with your existing issue trackers such as Jira, GitLab, and more. This way, your security team can manage cybersecurity vulnerabilities outside of Acunetix along with all other issues.
- Acunetix can work with other security tools. For example, you can use Acunetix to set up temporary web application firewall (WAF) rules before your team can fix the vulnerability.
Further Manual Information Security TestingIn addition to an Acunetix scan, you can and you should follow up with further manual web and network protocol tests done using command-line and GUI-based penetration testing tools.
- While Acunetix tests for weak passwords using its own or supplied dictionary, you may attempt additional manual password cracking, for example, using a password cracker such as John the Ripper or THC Hydra.
- Acunetix can help you with network scanning but it does not test WiFi security. Therefore, you may need to use other tools, such as aircrack-ng, to check for example for WEP/WPA vulnerabilities.
- For further manual web and network traffic tests, you can use free manual pentesting tools and open-source tools such as packet analyzers, sniffers, brute force tools, testing frameworks, open port scanning tools, network mappers, and more. Some examples of such penetration testing tools are: Kali Linux, Zed Attack Proxy (ZAP), w3af, Nmap, Metasploit, Wireshark, Burp Suite, sqlmap, and more.
Frequently asked questions
The term penetration testing software is used to describe any software that can be used for performing manual or automated penetration tests. This includes network security and web security tools as well as many others. Vulnerability scanners are considered automated penetration testing software.
There are many free and professional penetration testing tools. These tools include automated vulnerability scanners like Acunetix. They also include manual tools like attack proxies (e.g. Burp Proxy), password crackers (e.g. John the Ripper), exploit frameworks (e.g. Metasploit), or even complete operating system distributions (Kali Linux).
You should do both. Vulnerability scanning is considered as automated penetration testing or as initial penetration testing. A vulnerability scanner can find 99% of vulnerabilities, but not all of them. That is why it is useful to follow up with additional manual penetration testing.
You should do both. Vulnerability assessment is the stage that follows vulnerability scanning and penetration testing. A professional product like Acunetix first finds all vulnerabilities. Then it assesses their potential impact based on the severity of the vulnerability and the importance of the business asset.
Learn more about prominent vulnerabilities, keep up with recent product updates, and catch the latest news from Acunetix.
“We use Acunetix as part of our Security in the SDLC and to test code in DEV and SIT before being promoted to Production.”Kurt Zanzi, Xerox CA-MMIS Information Securtiy Office, Xerox