Vulnerability

How Acunetix compares against other vulnerability scanners?

How Acunetix compares against other vulnerability scanners?

We’ve previously talked about the importance of web vulnerability scanners We’ve also touched on some of the services Acunetix offers But how does Acunetix compares with other web vulnerability scanners out there Here’s a closer look Sucuri Sucuri is a free malware and security scanner The website allows you to do a quick test for malware, blacklisting status, injected SPAM, etc Just type in your website...

Read More →

Acunetix: A Faster, More Accurate OWASP ZAP Alternative

Acunetix: A Faster, More Accurate OWASP ZAP Alternative

If you are choosing a web security scanner for the first time, or are having trouble getting the most out of Open Web Application Security Project ZED Attack Proxy (OWASP ZAP), here is why you should consider Acunetix as an alternative If you are building a web application security testing program from the ground up, you need a security tool built to scan for the full range of security vulnerabilities...

Read More →

What Are JSON Injections

What Are JSON Injections

The term JSON injection may be used to describe two primary types of security issues: Server-side JSON injection happens when data from an untrusted source is not sanitized by the server and written directly to a JSON streamClient-side JSON injection happens when data from an untrusted JSON source is not sanitized and parsed directly using the JavaScript eval function What Is JSON JSON (JavaScript...

Read More →

7 Steps to Avoid Uncoordinated Vulnerability Disclosure

7 Steps to Avoid Uncoordinated Vulnerability Disclosure

Imagine the following situation You work as a security manager for a company that owns the website wwwexamplecom One day, your sales department receives an email from an unknown individual The sales department forwards it to you The email has the following content: You examplecom/loginphp page break Send XSS </script><img/%00/src="worksinchrome:prompt(1)"/%00/onerror=’eval(src)’><img/ src=`~`...

Read More →

Session Hijacking and Other Session Attacks

Session Hijacking and Other Session Attacks

Session IDs are a tasty treat for malicious hackers Once an attacker gets their hands on a session ID, they can get unauthorized access to a web application and fully impersonate a valid user In general, there are three primary methods to obtain a valid session ID: Guessing a valid session ID (session prediction)Creating a valid session ID and tricking the user into using it (session fixation)Obtaining a valid...

Read More →