Acunetix Web Vulnerability Scanner
Automatically detects SQL injection, cross site scripting and other web vulnerabilities
SQL injection is a hacking technique which modifies SQL commands in order to gain access to data in the database. Cross site scripting attacks allow a hacker to execute a malicious script on your visitor´s browser. Acunetix Web Vulnerability Scanner can check if your web application is vulnerable to both of these attacks. More information about SQL injection and cross site scripting at the Acunetix web site security centr
Other detected Web Vulnerbilities
CRLF injection attacks
Code execution attacks
Directory traversal attacks
File inclusion attacks
Authentication attacks
Detects Google hacking vulnerabilities
Google hacking is the term used for a hacker trying to find exploitable targets and sensitive data by entering queries in search engines. The Google Hacking Database (GHDB) contains queries that identify sensitive data such as portal logon pages, logs with network security information, and so on. Acunetix launches all the Google hacking database queries onto the crawled content of your web site, to find any sensitive data or exploitable targets before a “search engine hacker” does. The Google hacking feature is a unique, industry first feature.
Extend attacks with the HTTP editor & sniffer
With the HTTP editor, you can construct HTTP/HTTPS requests and analyze the web server responses. Use it to perform custom SQL injection and cross site scripting attacks. With the HTTP sniffer you can log, intercept and modify all HTTP/HTTPS traffic, giving you an in-depth insight into what data your web application is sending.
Other Features
Test password strength of login pages by launching a dictionary attack
Report Generator: Creates reports specifying the vulnerabilities detected and suggests what can be done to resolve them.
Create custom web attack & check or modify existing ones with the Vulnerability editor
Supports all major web technologies, including ASP, ASP.NET, PHP and CGI
Use different scanning profiles to scan websites with different identity and scan options
Compare scans & find differences with previous scans and discover new vulnerabilities
Easily re-audit website changes
Crawl & interpret Flash files
Automatic Custom error page detection
Discovers directories with weak permissions
Determines if dangerous HTTP methods are enabled on the web server (e.g. PUT, TRACE, DELETE) and inspects the HTTP version banners for vulnerable products.
Download from HERE
Share This Post »»
|
|
Tweet |
0 comments :
Post a Comment