When you build web applications, you often use multiple back-end web services to interface between client-side and server-side applications. For example, enterprises use functional subdomains to distribute static content or application logic between API requests. To scan the entire web application, the web vulnerability scanner…
Author Archives Daniel Zammit
How to Use Excluded Hours
Acunetix provides additional functionality for managing your scans. You may encounter a situation, where scans should not interfere with scheduled deployments or hinder the web application functionality during certain times. With that in mind, it is possible to configure excluded hours for Acunetix during which…
How to Configure Acunetix with Kenna Security
You can integrate Acunetix with Kenna Security as a connector, out of the box. The following configuration applies to both the Kenna VM appliance and the SaaS solution. First, create a new Kenna instance. On the Home page, you can see statistics for imported vulnerability…