SQLi – How it works (Part 1)

In this 6 part series on SQLi (SQL Injection) we shall be describing the vulnerability and its variants, showing how it works and what an attacker can do with it. SQL injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL…

Read more

Acunetix Port Scanner

The Acunetix Port Scanner performs a port scan against the server hosting the scanned website. When open ports are found, Acunetix Web Vulnerability Scanner will proceed with network level security checks against the network service running on that port, such as DNS Open Recursion tests,…

Read more