The following article shows you how you can run a Java application in a Docker container and then use AcuSensor to run an interactive application security testing (IAST) scan for that application. Step 1: Prepare an Example Application Using Eclipse IDE Go to the menu…
Author Archives Kevin Attard Compagno
How to Use the Acunetix Business Logic Recorder
The Business Logic Recorder is a new and unique Acunetix feature that lets you test more web applications without extensive manual work or additional non-automated tools. Most automated web vulnerability scanners do not have any mechanisms that let you test applications with complex business logic….
Scanning the bWAPP Application with Acunetix
The bWAPP application is an intentionally vulnerable web application. It was developed for educational purposes – in fact, bWAPP stands for buggy Web APPlication. We will show you how to deploy this web application and we will scan it using Acunetix as an IAST (interactive…
Scanning OWASP Juice Shop with Acunetix
Juice Shop is an intentionally vulnerable web application developed by OWASP for educational purposes. We will go through the steps of deploying this web application and we will run a scan on it using Acunetix as a DAST (black box) tool. The OWASP Juice Shop…
How to Recover from a Hacked Website Event
Any fellow website owner or webmaster you may ask who is beyond the novice stage will agree that one of their top priorities will always be keeping their websites secure. However, exploits and tools available to hackers are so vast, and software technologies evolve so…
Adding Custom Vulnerability Checks to Your Acunetix Installation
Overview This document describes how to extend an Acunetix On-Premises installation with custom vulnerability checks. Even though a default installation of Acunetix already includes thousands of carefully crafted vulnerability checks, users with specific requirements and customized environments may benefit from extending scan coverage and functionality…