Acunetix Version 13 build 13.0.200508159 for Windows and Linux has been released. This new build introduces the Business Logic Recorder, which allows the user to record logic implemented in multi-step web forms. The Acunetix scanner will go through the multi-step form and will be able…
Even the Mightiest Fall: An SQL Injection in Sophos XG Firewall
Do you really think you are safe from web vulnerabilities or that they are just minor problems? A few days ago Sophos, one of the world’s most renowned security companies, found an SQL Injection in their product. What is worse, they found the vulnerability because…
Acunetix Partners with Prianto Global on Distribution Contract
Austin, Texas, April 29, 2020 — Acunetix, the pioneer in automated web application security software, announced today that it has partnered with Prianto Global. Partners will have the opportunity to sign up with Prianto as an Acunetix reseller, providing them with the opportunity to enjoy…
The Challenges for Security Teams: The Bangladesh e-GOV CIRT
Security teams worldwide face similar challenges – both independent teams and those that are part of medium and large organizations. Due to the cybersecurity skill gap, such teams often lack in numbers. On the other hand, their clients keep providing more work. As a result,…
Scanning the bWAPP Application with Acunetix
The bWAPP application is an intentionally vulnerable web application. It was developed for educational purposes – in fact, bWAPP stands for buggy Web APPlication. We will show you how to deploy this web application and we will scan it using Acunetix as an IAST (interactive…
Acunetix Awards Alpha Generation UK Distribution Contract
Austin, Texas, April 20, 2020 – Acunetix, the pioneer in automated web application security software, announced today that it has selected Alpha Generation as a distribution partner in the United Kingdom. Resellers will have the opportunity to sign up with Alpha Generation as an Acunetix…
An Introduction to Web Shells (Web Shells Part 1)
A web shell is a malicious script used by an attacker with the intent to escalate and maintain persistent access on an already compromised web application. A web shell itself cannot attack or exploit a remote vulnerability, so it is always the second step of…
Web Shells 101 Using PHP (Web Shells Part 2)
In part 1 of this series, we looked at what a web shell is and why an attacker would seek to use one. In part 2 of this series, we’ll be looking at some specific examples of web shells developed using the PHP programming language….
Keeping Web Shells Under Cover (Web Shells Part 3)
In part 2 of this series, we looked at specific examples of web shells in the PHP programming language. In part 3 of this series, we’ll be looking at some techniques that attackers use to keep web shells hidden. Commands can be sent to the…