Acunetix web vulnerability scanner

How Acunetix Works

Acunetix works in the following manner:

  • Acunetix DeepScan analyses the entire website by following all the links on the site, including links which are dynamically constructed using JavaScript, and links found in robots.txt and sitemap.xml (if available). The result is a map of the site, which Acunetix will use to launch targeted checks against each part of the site.
  • If Acunetix AcuSensor Technology is enabled, the sensor will retrieve a listing of all the files present in the web application directory and add the files not found by the crawler to the crawler output. Such files usually are not discovered by the crawler as they are not accessible from the web server, or not linked through the website. Acunetix AcuSensor also analyses files which are not accessible from the internet, such as web.config.
  • After the crawling process, the scanner automatically launches a series of vulnerability checks on each page found, in essence emulating a hacker. Acunetix also analyses each page for places where it can input data, and subsequently attempts all the different input combinations. This is the Automated Scan Stage. If the AcuSensor Technology is enabled, a series of additional vulnerability checks are launched against the website. More information about AcuSensor is provided in the following section.
  • The vulnerabilities identified are shown in the Scan Results. Each vulnerability alert contains information about the vulnerability such as POST data used, affected item, HTTP response of the server and more.
  • If AcuSensor Technology is used, details such as source code line number, stack trace or affected SQL query which lead to the vulnerability are listed. Recommendations on how to fix the vulnerability are also shown.
  • Various reports can be generated on completed scans, including Executive Summary report, Developer report and various compliance reports such as PCI DSS or ISO 270001.
Tailored Protection

Risk
Reduction

Trusted Expertise

Trusted
Expertise

24/7 Support

24/7
Support

Easy Compliance

Pain-Free
Compliance

Latest Articles

Do I need a penetration test?

Do I need a penetration test?

Do I need a penetration test? If you have a website that takes information about usersโ€ฆ If you have a website that takes credit cardsโ€ฆ If you have an internal system that shares personal information with external bodiesโ€ฆ If you develop systems that will hold personal...

read more
How do you perform a vulnerability scan?

How do you perform a vulnerability scan?

How do you perform a vulnerability scan? A vulnerability scan is performed by a piece of software that resides either on a system inside the network, or more often on a cloud service. Modern scanners are very powerful and have a lot of automation built-in, so for a...

read more
Vulnerability scanning

Vulnerability scanning

What does vulnerability scanning do? Vulnerability scanning is the process of scanning software and systems for known vulnerabilities. A vulnerability scanner will maintain and refer to a massive database of known vulnerabilities in order to compare and classify...

read more
What is a virtual CISO? When and how to hire one

What is a virtual CISO? When and how to hire one

Chief information security officers (CISOs) are in high demand, and good ones are expensive and difficult to find. Following a rash of high-profile data breaches, and knowing that such breaches have far-reaching consequences that are far more costly than the cost of...

read more
Penetration Testing vs Vulnerability Scanning

Penetration Testing vs Vulnerability Scanning

Penetration testing and vulnerability scanning are often confused as the same service. This leads to business owners purchasing one when they really need the other. Below, we will outline the differences between the two to help better your understanding and ascertain which service your business requires.

read more
A DATA security partner you can count on

A DATA security partner you can count on

Unity Metrix Unity Metrix are a company formed of IT and security professionals who have been in the business a very long time. We live by the tenets of honesty, integrity and helpfulness and deliver services that align with those tenets.

read more

Get in Touch

Have any questions or need assistance? Fill out the form below and one of our helpful and friendly cyber security experts will get back to you promptly.