Scanning a Google OAuth 2.0 Web Application

Scanning a Google OAuth 2.0 Web Application

One of the most important qualities of a professional web application vulnerability scanner is the ability to reach every part of the web application, including the protected areas. While many scanners struggle with this, Acunetix supports several authentication mechanisms and offers an easy way to... Read more The post Scanning ... Read More
Managing Scans using Bash and the Acunetix API

Managing Scans using Bash and the Acunetix API

The Acunetix API allows you to programmatically manage your Acunetix tasks, including triggering scans for targets, checking the status of your scans, and retrieving a list of vulnerabilities found by your scans. This example can serve as a primer for building such programmatic tools. In... Read more The post Managing ... Read More
Scanning a GraphQL API for Vulnerabilities

Scanning a GraphQL API for Vulnerabilities

Since June 2020, Acunetix supports the increasingly popular API query language – GraphQL. In this article, we want to show you step-by-step how to scan an API defined using GraphQL. To do this, you will first create an intentionally vulnerable API and its GraphQL definition,... Read more The post Scanning ... Read More
Step-By-Step Configuration with Azure DevOps Services

Step-By-Step Configuration with Azure DevOps Services

You can integrate your Acunetix Premium account with Azure DevOps Services. This integration lets you send all the vulnerabilities discovered using Acunetix to Azure DevOps, where you can manage them as issues. This article shows how to set up your Azure DevOps account and how... Read more The post Step-By-Step ... Read More
Step-by-Step Configuration with GitLab

Step-by-Step Configuration with GitLab

| | Product Articles
You can manage web vulnerabilities internally with Acunetix. However, these vulnerabilities will need to be fixed by developers and the developers may already use an issue management system. Therefore, managing them internally might not be an optimal choice. In such a case, your vulnerability scanner... Read more The post Step-by-Step ... Read More
Scanning a REST API for Vulnerabilities

Scanning a REST API for Vulnerabilities

Many complex web applications are built using REST APIs. Acunetix can help you ensure the security of all your REST APIs just as effectively as in the case of monolithic web applications and websites. In this article, you will learn how to discover and fix... Read more The post Scanning ... Read More
Scanning a SOAP Web Service for Vulnerabilities

Scanning a SOAP Web Service for Vulnerabilities

APIs and web services may seem less popular than websites and web applications but that is not true. Already back in 2018, APIs were responsible for 83% of web traffic worldwide. Most complex applications are based on microservices and microservices are basically web applications communicating... Read more The post Scanning ... Read More
Using Python to Make API Calls to Your Acunetix Installation

Using Python to Make API Calls to Your Acunetix Installation

In addition to several out-of-the-box integrations, Acunetix provides an API, which lets you integrate the scanner with any environment. The Acunetix API lets you use any of the scanner functions with no need to access the scanner UI. As an example, we will show you... Read more The post Using ... Read More
Step-By-Step Configuration with Jira

Step-By-Step Configuration with Jira

You can manage web vulnerabilities internally with Acunetix. However, these vulnerabilities will need to be fixed by developers and the developers may already use an issue management system. Therefore, managing them internally might not be an optimal choice. In such a case, your vulnerability scanner... Read more The post Step-By-Step ... Read More
Tracking a Vulnerability from Detection to Resolution

Tracking a Vulnerability from Detection to Resolution

Acunetix is not just a web vulnerability scanner, it is a full vulnerability management solution. In this article, we want to show you the entire process of finding a vulnerability and then fixing it. You will see how features of Acunetix make this process much... Read more The post Tracking ... Read More