You are on page 1of 64

Web Vulnerability Scanner v10

Product Manual

Informationinthisdocumentissubjecttochangewithoutnotice.Companies,names,and
datausedinexampleshereinarefictitiousunlessotherwisenoted.Nopartofthisdocument
maybereproducedortransmittedinanyformorbyanymeans,electronicormechanical,for
anypurpose,withouttheexpresswrittenpermissionofAcunetixLtd.

AcunetixWebVulnerabilityScanneriscopyrightofAcunetixLtd.20042015.
AcunetixLtd.Allrightsreserved.
http://www.acunetix.com
info@acunetix.com

Documentversion10
Lastupdated:26thJune2015

Table of Contents

Introduction
Overview
Installing Acunetix
Installing AcuSensor
Scanning a Website
Analysing Scan Results
Scanning Web Services
Generating Reports
Acunetix Reports
Scheduling Scans
Troubleshooting and Support

Introduction to Acunetix Web Vulnerability Scanner


Why You Need To Secure Your Web Applications
Websitesecurityistoday'smostoverlookedaspectofsecuringanenterpriseandshouldbe
apriorityinanyorganization.Increasingly,hackersareconcentratingtheireffortson
webbasedapplicationsshoppingcarts,forms,loginpages,dynamiccontent,etc.
Accessible24/7fromanywhereintheworld,insecurewebapplicationsprovideeasyaccess
tobackendcorporatedatabasesandalsoallowhackerstoperformillegalactivitiesusingthe
attackedsites.Avictimswebsitecanbeusedtolaunchcriminalactivitiessuchashosting
phishingsitesortotransferillicitcontent,whileabusingthewebsitesbandwidthandmaking
itsownerliablefortheseunlawfulacts.

Hackersalreadyhaveawiderepertoireofattacksthattheyregularlylaunchagainst
organizationsincludingSQLInjection,CrossSiteScripting,DirectoryTraversalAttacks,
ParameterManipulation(e.g.,URL,Cookie,HTTPheaders,webforms),Authentication
Attacks,DirectoryEnumerationandotherexploits.
Thehackingcommunityisalsoverycloseknitnewlydiscoveredwebapplicationintrusions,
knownasZeroDayexploits,arepostedonanumberofforumsandwebsitesknownonlyto
membersofthatexclusiveundergroundgroup.Postingsareupdateddailyandareusedto
propagateandfacilitatefurtherhacking.

Webapplicationsshoppingcarts,forms,loginpages,dynamiccontent,andotherbespoke
applicationsaredesignedtoallowyourwebsitevisitorstoretrieveandsubmitdynamic
contentincludingvaryinglevelsofpersonalandsensitivedata.
Ifthesewebapplicationsarenotsecure,thenyourentiredatabaseofsensitiveinformationis
atseriousrisk.AGartnerGroupstudyrevealsthat75%ofcyberattacksaredoneattheweb
applicationlevel.

Whyarewebapplicationsvulnerable?
Websitesandwebapplicationsareeasilyavailableviatheinternet24hoursaday,7
daysaweektocustomers,employees,suppliersandthereforealsohackers.
FirewallsandSSLprovidenoprotectionagainstwebapplicationhacking,simply
becauseaccesstothewebsitehastobemadepublic.
Webapplicationsoftenhavedirectaccesstobackenddatasuchascustomer
databases.
Mostwebapplicationsarecustommadeand,therefore,involvealesserdegreeof
testingthanofftheshelfsoftware.Consequently,customapplicationsaremore
susceptibletoattack.
Varioushighprofilehackingattackshaveproventhatwebapplicationsecurity
remainsthemostcritical.Ifyourwebapplicationsarecompromised,hackerswill
havecompleteaccesstoyourbackenddataeventhoughyourfirewallisconfigured
correctlyandyouroperatingsystemandapplicationsarepatchedrepeatedly.
Networksecuritydefenseprovidesnoprotectionagainstwebapplicationattacks
sincethesearelaunchedonport80whichhastoremainopentoallowregular

operationofthebusiness.Itisthereforeimperativethatyouregularlyandconsistently
audityourwebapplicationsforexploitablevulnerabilities.

The need for automated web application security scanning


Manualvulnerabilityauditingofallyourwebapplicationsiscomplexandtimeconsuming,
sinceitgenerallyinvolvesprocessingalargevolumeofdata.Italsodemandsahighlevelof
expertiseandtheabilitytokeeptrackofconsiderablevolumesofcodeusedinaweb
application.Inaddition,hackersareconstantlyfindingnewwaystoexploityourweb
application,whichmeansthatyouwouldhavetoconstantlymonitorthesecurity
communities,andfindnewvulnerabilitiesinyourwebapplicationcodebeforehackers
discoverthem.

Automatedvulnerabilityscanningallowsyoutofocusonthealreadychallengingtaskof
buildingawebapplication.Anautomatedwebapplicationscannerisalwaysonthelookout
fornewattackpathsthathackerscanusetoaccessyourwebapplicationorthedatabehind
it.
Withinminutes,anautomatedwebapplicationscannercanscanyourwebapplication,
identifyallthefilesaccessiblefromtheinternetandsimulatehackeractivityinordertoidentify
vulnerablecomponents.

Inaddition,anautomatedvulnerabilityscannercanalsobeusedtoassessthecodewhich
makesupawebapplication,allowingittoidentifypotentialvulnerabilitieswhichmightnotbe
obviousfromtheinternet,butstillexistinthewebapplication,andcanthusstillbeexploited.

Acunetix Web Vulnerability Scanner


AcunetixWebVulnerabilityScannerisanautomatedwebapplicationsecuritytestingtoolthat
auditsyourwebapplicationsbycheckingforvulnerabilitieslikeSQLInjection,Crosssite
scriptingandotherexploitablevulnerabilities.Ingeneral,AcunetixWebVulnerabilityScanner
scansanywebsiteorwebapplicationthatisaccessibleviaawebbrowserandusesthe
HTTP/HTTPSprotocol.

AcunetixWebVulnerabilityScanneroffersastronganduniquesolutionforanalyzing
offtheshelfandcustomwebapplicationsincludingthoseutilizingJavaScript,AJAXandWeb
2.0webapplications.Acunetixhasanadvancedcrawlerthatcanfindalmostanyfile.Thisis
importantsincewhatisnotfoundcannotbechecked.

How Acunetix Web Vulnerability Scanner Works


AcunetixWebVulnerabilityScannerworksinthefollowingmanner:
1. AcunetixDeepScananalysestheentirewebsitebyfollowingallthelinksonthesite,
includinglinkswhicharedynamicallyconstructedusingJavaScript,andlinksfoundin
robots.txtandsitemap.xml(ifavailable).Theresultisamapofthesite,which
AcunetixWebVulnerabilityScannerwillusetolaunchtargetedchecksagainsteach
partofthesite.


ScreenshotCrawlerResults

2. IfAcunetixAcuSensorTechnologyisenabled,thesensorwillretrievealistingofall
thefilespresentinthewebapplicationdirectoryandaddthefilesnotfoundbythe
crawlertothecrawleroutput.Suchfilesusuallyarenotdiscoveredbythecrawleras
theyarenotaccessiblefromthewebserver,ornotlinkedthroughthewebsite.
AcunetixAcuSensoralsoanalysesfileswhicharenotaccessiblefromtheinternet,
suchasweb.config.
3. Afterthecrawlingprocess,theWebVulnerabilityScannerautomaticallylaunchesa
seriesofvulnerabilitychecksoneachpagefound,inessenceemulatingahacker.
AcunetixWebVulnerabilityScanneralsoanalyseseachpageforplaceswhereitcan
inputdata,andsubsequentlyattemptsallthedifferentinputcombinations.Thisisthe
AutomatedScanStage.IftheAcuSensorTechnologyisenabled,aseriesof
additionalvulnerabilitychecksarelaunchedagainstthewebsite.Moreinformation
aboutAcuSensorisprovidedinthefollowingsection.

ScreenshotScanResults

4. ThevulnerabilitiesidentifiedareshownintheScanResults.Eachvulnerabilityalert
containsinformationaboutthevulnerabilitysuchasPOSTdataused,affecteditem,
httpresponseoftheserverandmore.
5. IfAcuSensorTechnologyisuseddetailssuchassourcecodelinenumber,stack
traceoraffectedSQLquerywhichleadtothevulnerabilityarelisted.
Recommendationsonhowtofixthevulnerabilityarealsoshown.

6. Variousreportscanbegeneratedoncompletedscans,includingExecutiveSummary
report,DeveloperreportandvariouscompliancereportssuchasPCIorISO270001.

Acunetix AcuSensor Technology


AcunetixsuniqueAcuSensorTechnologyallowsyoutoidentifymorevulnerabilitiesthan
otherWebApplicationScanners,whilstgeneratinglessfalsepositives.AcunetixAcuSensor
indicatesexactlywhereinyourcodethevulnerabilityisandreportsadditionaldebug
information.

ScreenshotAcuSensorpinpointsvulnerabilitiesincode

Theincreasedaccuracy,availableforPHPand.NETwebapplications,isachievedby
combiningblackboxscanningtechniqueswithfeedbackfromsensorsplacedinsidethe
sourcecode.Blackboxscanningdoesnotknowhowtheapplicationreactsandsourcecode
analyzersdonotunderstandhowtheapplicationwillbehavewhileitisbeingattacked.
AcuSensortechnologycombinesbothtechniquestoachievesignificantlybetterresultsthan
usingsourcecodeanalyzersandblackboxscanningindependently.

TheAcuSensorsensorscanbeinsertedinthe.NETandPHPcodetransparently.The.NET
sourcecodeisnotrequiredthesensorscanbeinjectedinalreadycompiled.NET

applications!Thusthereisnoneedtoinstallacompilerorobtainthewebapplications
sourcecode,whichisabigadvantagewhenusingathirdparty.NETapplication.Incaseof
PHPwebapplications,thesourceisreadilyavailable.Todate,AcunetixistheonlyWeb
VulnerabilityScannertoimplementthistechnology.

Advantages of using AcuSensor Technology

Abilitytoprovidemoreinformationaboutthevulnerability,suchassourcecodeline
number,stacktrace,affectedSQLquery.
Allowsyoutolocateandfixthevulnerabilityfasterbecauseoftheabilitytoprovide
moreinformationaboutthevulnerability,suchassourcecodelinenumber,stack
trace,affectedSQLquery,etc.
Significantlyreducesfalsepositiveswhenscanningawebsitebecauseitunderstands
thebehaviorofthewebapplicationbetter.
Alertsyoutowebapplicationconfigurationproblemswhichcanresultinavulnerable
applicationorexposesensitiveinformation.E.g.Ifcustomerrorsareenabledin
.NET,thiscouldexposesensitiveapplicationdetailstoamalicioususer.
Advisesyouhowtobettersecureyourwebserversettings,e.g.ifwriteaccessis
enabledonthewebserver.
DetectsmoreSQLinjectionvulnerabilities.PreviouslySQLinjectionvulnerabilities
couldonlybefoundifdatabaseerrorswerereported,whereasnowthesourcecode
canbeanalyzedforimproveddetection.
AbilitytodetectSQLinjectionvulnerabilitiesinallSQLstatements,includinginSQL
INSERTstatements.UsingablackboxscannersuchSQLinjectionvulnerabilities
cannotbefound.ThissignificantlyincreasestheabilityforAcunetixWebVulnerability
Scannertofindvulnerabilities.
Discoversallthefilespresentandaccessiblethroughthewebserver.Ifanattacker
gainsaccesstothewebsiteandcreatesabackdoorfileintheapplicationdirectory,
thefileisfoundandscannedwhenusingtheAcuSensorTechnologyandyouwillbe
alerted.
AcuSensorTechnologyisabletointerceptallwebapplicationinputsandbuilda
comprehensivelistwithallpossibleinputsinthewebsiteandtestthem.
NoneedtowriteURLrewriteruleswhenscanningwebapplicationswhichuse
searchenginefriendlyURLs!UsingtheAcuSensorTechnologythescannerisableto
rewriteSEOURLsonthefly.
Abilitytotestforarbitraryfilecreationanddeletionvulnerabilities.E.g.Througha
vulnerablescriptamalicioususercancreateafileinthewebapplicationdirectory
andexecuteittohaveprivilegedaccess,ordeletesensitivewebapplicationfiles.
Abilitytotestforemailinjection.E.g.Amalicioususermayappendadditional
informationsuchasalistorrecipientsoradditionalinformationtothemessagebody
toavulnerablewebform,tospamalargenumberofrecipientsanonymously.

Network Vulnerability Scanning


Aspartofawebsiteaudit,Acunetixwillexecuteanetworksecurityauditoftheserverhosting
thewebsite.Thisnetworksecurityscanwillidentifyanyservicesrunningonthescanned
serverbyrunningaportscanonthesystem.Acunetixwillreporttheoperatingsystemand

thesoftwarehostingtheservicesdetected.ThisprocesswillalsoidentifyTrojanswhich
mightbelurkingontheserver.

ThenetworkvulnerabilityscanassessesthesecurityofpopularprotocolssuchasFTP,
DNS,SMTP,IMAP,POP3,SSH,SNMPandTelnet.Apartfromtestingforweakordefault
passwords,Acunetixwillalsocheckformisconfigurationintheservicesdetectedwhich
couldleadtoasecuritybreach.Acunetixwillalsocheckthatanyotherserversrunningonthe
machinearenotusinganydeprecatedprotocols.Alltheseleadtoaninsecuresystem,which
wouldallowanintrudertodamageyourwebsiteandyourreputation.

AcunetixOnlineVulnerabilityScanner(OVS)alsointegratesthepopularOpenVASnetwork
scannertocheckforover35,000networkvulnerabilities.Duringanetworkscan,Acunetix
OVSmakesuseofvariousportprobingandOSfingerprintingtechniquestoidentifyavast
numberofdevices,OperatingSystemsandserverproducts.Numeroussecuritychecksare
thenlaunchedagainsttheproductsidentifiedrunningonthescannedserver,allowingyouto
detectallthevulnerabilitiesthatexistonyourperimeterservers.

Acunetix Web Vulnerability Scanner Overview


AcunetixWebVulnerabilityScannerallowsyoutosecureyourwebsitequicklyandefficiently.
Itconsistsofthefollowingcomponents:

ScreenshotAcunetixWebVulnerabilityScanner

WebScanner
TheWebScannerlaunchesanautomaticsecurityauditofawebsite.Awebsitesecurity
scantypicallyconsistsoftwophases:
1. CrawlingMakinguseofAcunetixDeepScan,AcunetixWebVulnerabilityScanner
automaticallyanalyzesandcrawlsthewebsiteinordertobuildthesite'sstructure.
Thecrawlingprocessenumeratesallfilesandisvitaltoensurethatallthefilesof
yourwebsitearescanned.
2. ScanningAcunetixWebVulnerabilityScannerlaunchesaseriesofwebvulnerability
checksagainsteachfileinyourwebapplicationineffect,emulatingahacker.The
resultsofascanaredisplayedintheAlertNodetreeandincludecomprehensive
detailsofallthevulnerabilitiesfoundwithinthewebsite.

AcuSensorTechnologyAgent
AcunetixAcuSensorTechnologyisauniquetechnologythatallowsyoutoidentifymore
vulnerabilitiesthanatraditionalblackboxwebsecurityscanner,andisdesignedtofurther

reducefalsepositives.Additionally,italsoindicatesthecodewherethevulnerabilitywas
found.Thisincreasedaccuracyisachievedbycombiningblackboxscanningtechniques
withdynamiccodeanalysiswhilstthesourcecodeisbeingexecuted.ForAcunetix
AcuSensortowork,anagentmustbeinstalledonyourwebsitetoenablecommunication
betweenAcunetixWebVulnerabilityScannerandAcuSensor.AcunetixAcuSensorcanbe
usedwithbothPHPand.NETwebapplications.

AcuMonitorService
Somevulnerabilitiescanonlybedetectedusinganintermediateservice.TheAcunetix
AcuMonitorserviceallowsAcunetixWebVulnerabilityScannertodetectsuchvulnerabilities.
Dependingonthevulnerability,AcuMonitorcaneitherreportthevulnerabilityimmediately
duringascan,orsendanotificationemaildirectlytotheuserifthevulnerabilityisidentified
afterthescanhasfinished.MoreinformationontheAcuMonitorServicecanbefoundat
http://www.acunetix.com/websitesecurity/acumonitor/

PortScanner

ScreenshotPortScanning

ThePortScannerperformsaportscanagainstthewebserverhostingthescannedwebsite.
Whereopenportsarefound,AcunetixWebVulnerabilityScannerwillperformnetworklevel
securitychecksagainstthenetworkservicerunningonthatport.TheseincludeDNSOpen
Recursiontests,badlyconfiguredproxyservertests,weakSNMPcommunitystrings,and
manyothernetworklevelsecuritychecks.
Youcanalsowriteyourownnetworkservicessecuritychecksusingthescriptengine.A
scriptingreferenceisavailablefrom:

http://www.acunetix.com/blog/docs/creatingcustomchecksacunetixwebvulnerabilityscan
ner/

TargetFinder

ScreenshotTargetFinder

TheTargetFinderisascannerthatallowsyoutolocatewebservers(generallyonports80,
443)withinagivenrangeofIPaddresses.Ifawebserverisfound,thescannerwillalso
displaytheresponseheaderoftheserverandthewebserversoftware.Theportnumbersto
scanareconfigurable.
Moreinformationaboutthetargetfindercanbefoundhere:
http://www.acunetix.com/blog/docs/targetfinder/

SubdomainScanner

ScreenshotSubdomainScanner

Usingvarioustechniques,theSubdomainscannerallowsfastandeasyidentificationof
activesubdomainsofatopleveldomain.TheSubdomainScannercanbeconfiguredtouse
thetargetsDNSserveroranyotherDNSserverspecifiedbytheuser.
MoreinformationabouttheSubdomainscannercanbefoundhere:
http://www.acunetix.com/blog/docs/subdomainscanner/

BlindSQLInjector

ScreenshotBlindSQLInjector

Idealforpenetrationtesters,theBlindSQLinjectorisanautomateddatabasedataextraction
toolwithwhichyoucanmakemanualteststofurtheranalyzeSQLinjectionsreportedduring
ascan.ThetoolmakesuseofBlindSQLInjectiontechniquestoenumeratedatabasesand
tables,dumpdataandalsoreadspecificfilesonthefilesystemofthewebserverifan
exploitableSQLinjectionisdiscovered.

WiththeBlindSQLInjectortoolyoucanalsorunmanualteststocheckfordifferentvariants
ofSQLinjection.Usingthistool,youcanalsoruncustomSQLSelectqueriesagainstthe
database.
MoreinformationabouttheblindSQLinjectorcanbefoundhere:
http://www.acunetix.com/blog/docs/blindsqlinjectortool/

HTTPEditor

ScreenshotHTTPEditor

TheHTTPEditorallowsyoutocreate,analyze,andeditclientHTTPrequestsandserver
responses.Italsocontainsanencodinganddecodingtooltoencode/decodetextandURLs
toMD5hashes,UTF7formatsandmanyotherformats.
YoucanstarttheHTTPEditorfromtheToolsnodewithintheToolsExplorer.TheToppane
intheHTTPeditordisplaystheHTTPrequestdataandheaders.Thebottompanedisplays
theHTTPresponseheadersdata.
MoreinformationabouttheHTTPeditorcanbefoundhere:
http://www.acunetix.com/blog/docs/httpeditor/

HTTPSniffer

ScreenshotHTTPSniffer

TheHTTPSnifferactsasaproxyandallowsyoutocapture,examineandmodifyHTTP
trafficbetweenanHTTPclientandawebserver.Youcanalsoenable,addoredittrapsto
capturetrafficbeforeitissenttothewebserverorbacktothewebclient.Thistoolisuseful
to:
AnalyzehowSessionIDsarestoredandhowinputsaresenttotheserver.
AlteranyHTTPrequestsbeingsentbacktotheserverbeforetheygetsent.
Manualcrawlingnavigatethroughpartsofthewebsitewhichcannotbecrawled
automatically,andimporttheresultsintothescannertoincludetheminthe
automatedscan.

ForHTTPrequeststopassthroughAcunetixWebVulnerabilityScanner,AcunetixWeb
VulnerabilityScannermustbeconfiguredasaproxyinyourwebbrowser.

HTTPFuzzer

ScreenshotHTTPFuzzer

TheHTTPFuzzerenablesyoutolaunchaseriesofsophisticatedfuzzingteststoauditthe
webapplicationshandlingofinvalidandunexpectedrandomdata.TheHTTPFuzzeralso
allowsyoutoeasilycreateinputrulesforfurthertestinginAcunetixWebVulnerability
Scanner.

AnexamplewouldbethefollowingURL:http://testphp.acunetix.com/listproducts.php?cat=1

UsingtheHTTPFuzzeryoucancreatearulethatwouldautomaticallyreplacethelastpartof
theURL1withnumbersbetween1and999.Onlyvalidresultswillbereported.Thisdegree
ofautomationallowsyoutoquicklytesttheresultsofa1000querieswithouthavingto
performthemonebyone.

MoreinformationabouttheHTTPFuzzercanbefoundhere:
http://www.acunetix.com/blog/docs/httpfuzzertool/

AuthenticationTester

ScreenshotAuthenticationTester

WiththeAuthenticationTesteryoucanperformadictionaryattackagainstloginpagesthat
usebothHTTP(NTLMv1,NTLMv2,digest)orformbasedauthentication.Thistoolusestwo

predefinedtextfiles(dictionaries)containingalistofcommonusernamesandpasswords.
Youcanaddyourowncombinationstothesetextfiles.

MoreinformationabouttheAuthenticationtestercanbefoundhere:
http://www.acunetix.com/blog/docs/authenticationtester/

WebServicesScannerandWebServicesEditor

ScreenshotWebServicesScanner

TheWebServicesScannerallowsyoutolaunchautomatedvulnerabilityscansagainst
WSDLbasedWebServices.WebServicesarecommonlyusedtoexchangedataand
generallyvulnerabilitiesinWebServicescaneasilybeexploitedinordertoleaksensitive
information.

TheWebServicesEditorallowsyoutoimportanonlineorlocalWSDLforcustomediting
andexecutionofvariouswebserviceoperationsoverdifferentporttypesforanindepth
analysisofWSDLrequestsandresponses.Theeditoralsofeaturessyntaxhighlightingforall
languagestoeasilyeditSOAPheadersandcustomizeyourownmanualattacks.

AcunetixWebVulnerabilityScannerSDK

ScreenshotWebVulnerabilityScannerScriptingtool

TheAcunetixWebVulnerabilityScannerScriptingtoolallowsyoutocreatenewcustomweb
vulnerabilitychecks.ThesechecksmustbewritteninJavaScriptandrequireinstallationof
theSoftwareDevelopmentKit(SDK).Youcanreadmoreaboutwritingcustomwebsecurity
checksatthefollowingURL:
http://www.acunetix.com/blog/docs/creatingcustomvulnerabilitychecks/

YoucandownloadthescriptingSDKfrom:
http://www.acunetix.com/download/tools/Acunetix_SDK.zip

Reporter
TheReporterallowsyoutogeneratereportsofscanresultsinaprintableformat.Various
reporttemplatesareavailable,includingsummary,detailedreportsandcompliancereporting.
TheConsultantVersionofAcunetixWebVulnerabilityScannerallowscustomizationofthe
generatedreport.


ScreenshotTypicalReportincludingChartofalerts

NewinAcunetixWebVulnerabilityScannerVersion9

IntroductionofAcunetixDeepScan,whichmakesuseofthesamerenderingengine
usedinGoogleChromeandAppleSafaritobetteridentifythewebsite'sstructure
duringascan.AcunetixDeepScanprovidesahugeimprovementinscanningofAJAX
sites,JavaScriptbasedsitesandSinglePageApplications(SPA).
IntroductionoftheAcunetixAcuMonitorservice,whichisusedtoidentifyspecific
vulnerabilitieswhichrequireanintermediateserver.
Improvedsupportindetectingandscanningsmartphone/tabletfriendlywebsites.
Whenamobilefriendlysiteisscanned,theuserisgiventheoptiontocrawlandscan
thesiteasanormalbrowserorasasmartphonebrowser.
FullsupportforHTML5websites.
DetectionofDOMbasedXSSvulnerabilities.
DetectionofBlindXSSvulnerabilities(usingAcuMonitor).
DetectionofServerSideRequestForgery(SSRF),XMLExternalEntity(XXE),Mail
HeaderInjectionandHostHeaderbasedvulnerabilities(usingAcuMonitor).

NewinAcunetixWebVulnerabilityScannerVersion
9.5

DetectionofSQLInjection,XSSandothervulnerabilitiesinwebapplications
implementedinGoogleWebToolkit.
DetectionofvulnerabilitiesinJSONandXMLdataandHTTPHOSTHeaders.
AlertsarenowtaggedwiththeirCVE,CWEandCVSS.
AcuSensornowsupports.NET4.5.
IntroducedsupportforCRUD(create,read,updateanddelete).
NewreportforNIST80053rev4.

AcunetixBlogandSupportPage
AcunetixpublishesanumberofwebsecurityandAcunetixhowtotechnicaldocumentson
theAcunetixWebApplicationSecurityBloghttp://www.acunetix.com/blog.
Youcanalsofindanumberofsupportrelateddocuments,suchasFAQsintheAcunetix
WebVulnerabilityScannersupportpagehttp://www.acunetix.com/support.

LicensingAcunetixWebVulnerabilityScanner
AcunetixWebVulnerabilityScannerisavailablein5editions:SmallBusiness,Enterprise,
Enterprisex10instances,ConsultantandConsultantx10instances.Orderingandpricing
informationcanbefoundhere:
http://www.acunetix.com/ordering/pricing.htm

PerpetualorTimeBasedLicenses
AcunetixWebVulnerabilityScannerEnterpriseandConsultanteditionsaresoldasa1year
subscriptionorperpetuallicense.The1yearsubscriptionlicenseexpiresafter1yearfrom
thedateofdownloadoractivation.Theperpetuallicensedoesnotexpire.TheSmall
Businessversionisavailableasaperpetuallicenseonly.
Ifyoupurchasetheperpetuallicense,youmustbuyamaintenanceagreementtogetfree
supportandupgradesbeyondthefirstmonthafterpurchase.Themaintenanceagreement
entitlesyoutofreeversionupgradesandsupportforthedurationoftheagreement.
Supportandversionupgradesareincludedinthepriceoftheoneyearlicense.

EnterpriseEditionUnlimitedSites/Servers
TheEnterpriseeditionlicenseallowsyoutoinstallonecopyofAcunetixWebVulnerability
Scannerononecomputertoscananunlimitednumberofsitesorservers.Thesitesor
serversmustbeownedbyyourself(oryourcompany)andnotbythirdparties.Acunetix
Enterpriseeditionwillleaveatrailinthelogfilesofthescannedserverandscanningofthird
partysitesisprohibitedbythelicenseagreement.Additionallicensesarerequiredfor
separateinstallsontodifferentworkstations.Thiseditioncanalsobeupgradedtoallowupto
10simultaneousscans.

ConsultantEdition
TheConsultanteditionlicenseallowsyoutoinstallonecopyofAcunetixononecomputerto
scananunlimitednumberofsitesorserversincluding3rdpartysites,providedthatyouhave
obtainedpermissionfromtherespectivesiteowners.Thisisthecorrecteditiontouseifyou
areaconsultantwhoprovideswebsecuritytestingservicesorareahostingproviderorISP.
Theconsultanteditionalsoincludesthecapabilityofmodifyingthereportstoincludeyour
owncompanylogo.Thiseditiondoesnotleaveanytrailinthelogfilesofthescannedserver.
Additionallicensesarerequiredforseparateinstallsontodifferentworkstations.Thisedition
canalsobeupgradedtoallowupto10simultaneousscans.

LimitationsoftheTrial
ThetrialofAcunetixWebVulnerabilityScannerdownloadablefromtheAcunetixwebsite
ispracticallyidenticaltothefullversioninfunctionalityandfeatures,butcontainsthefollowing
limitations:
TheTrialeditionwillexpireafter15days.Whenscanningyourwebsite,alltheWeb
Alertswillbereported.Howeveryouwillnotbeabletodrilldownandfindwherethe
vulnerabilityisfoundinyourwebsite.
Reportscannotbegenerated.ScanresultswillnotbestoredintheReports
database.
Fullscans(includingdetailedinformationonthevulnerabilitiesdiscovered)canbe
madeagainstthefollowingAcunetixtestwebsites:
http://testphp.vulnweb.com
http://testasp.vulnweb.com
http://testaspnet.vulnweb.com
http://testhtml5.vulnweb.com
TheScanSchedulerisnotavailable.

IfyoudecidetopurchaseAcunetixWebVulnerabilityScanner,youwillneedtouninstallthe
trialandinstallthepurchasededition,whichmustbedownloadedasaseparateinstallerfile.
Downloadtheinstallerfileusingthelinkprovidedbyoursalesteam,anddoubleclicktobegin
thesetup.Youwillbepromptedtoremovethetrialandinstallthefulledition.Allsettingsfrom
thepreviouslyinstalledversionwillberetained.
Oncetheinstallationiscomplete,youwillbepromptedtoentertheLicensekey.

Installing Acunetix Web Vulnerability Scanner


Minimum System Requirements

Operatingsystem:MicrosoftWindowsXPandlater
CPU:32bitor64bitprocessor
Systemmemory:minimumof2GBRAM
Storage:200MBofavailableharddiskspace
MicrosoftInternetExplorer7(orlater)somecomponentsofInternetExplorerare
usedbyAcunetix
Optional:MicrosoftSQLServerforthereportingdatabase.BydefaultaMicrosoft
Accessdatabaseisused(MicrosoftAccessisnotrequired).

Installing Acunetix Web Vulnerability Scanner


1. DownloadthelatestversionofAcunetixWebVulnerabilityScannerfromthedownload
locationprovidedwhenyoupurchasedthelicense.
2. Doubleclickthewebvulnscan.exefiletolaunchtheAcunetixWebVulnerability
ScannerinstallationwizardandclickNextwhenprompted.
3. ReviewandaccepttheLicenseAgreement.
4. SelectthefolderlocationwhereAcunetixWebVulnerabilityScannerwillbeinstalled.
5. TheinstallationwillpromptyoutoinstallauniquerootcertificateusedforHTTPs
trafficandtocreateadesktopshortcut.
6. ClickInstalltostarttheinstallation.SetupwillnowcopyallfilesandinstalltheAcunetix
WebVulnerabilityScannerSchedulerservice.
7. ClickFinishwhenready.

Registering with AcuMonitor Service

ScreenshotAcuMonitorRegistration

WhenyoustartAcunetixWebVulnerabilityScannerthefirsttime,youwillbeaskedto
registerwiththeAcuMonitorService.TheAcuMonitorServiceisusedtoautomaticallydetect
certainvulnerabilitieswhichcanonlybedetectedusinganintermediateserver,suchasBlind
XSS,ServerSideRequestForgery(SSRF)andEmailHeaderInjection.

YoucanregistertotheAcuMonitorserviceusingyouremailaddressandyourlicensekey.
RegistrationcanalsobedoneatalaterstagefromAcunetixWebVulnerabilityScanner>
Configuration>ApplicationSettings>AcuMonitor.MoreinformationontheAcuMonitor
Servicecanbefoundat
http://www.acunetix.com/vulnerabilityscanner/acumonitorblindxssdetection/.

Installing AcuSensor in your web application


Ifyouneedtoscana.NETorPHPwebapplication,youshouldinstallAcunetixAcuSensoron
yourwebapplicationinordertoimprovethedetectionofvulnerabilities,getthelineinthe
sourcecodewherevulnerabilitiesarelocatedandtodecreasefalsepositives.

Upgrading Acunetix Web Vulnerability Scanner


Itisrecommendedthatyoubackupyoursettingsbeforeproceedingwiththeupgradeasper
http://www.acunetix.com/blog/docs/backupacunetixsettingscustomizations/.
ToupgradeapreviousversionofAcunetixWebVulnerabilityScannertothelatestversion:

1. CloseallinstancesofAcunetixWebVulnerabilityScanner(andrelatedutilitiessuch
astheReporter)
2. OptionallybackuptheLoginSequencesifyouwouldliketousetheseininthenewer
version.Dependingontheversion,thesecanbecopiedfrom<C:\ProgramFiles
(x86)\Acunetix\WebVulnerabilityScannerX\Data\General\LoginSequences>for
version7orolderor<C:\Users\Public\Documents\AcunetixWVS
X\LoginSequences>fornewerversions.
3. OptionallybackuptheReportingDatabaseifyouwouldliketouseitinthenewer
version.IfyouareusinganAccessDatabase,thedefaultlocationofthedatabaseis<
C:\ProgramFiles(x86)\Acunetix\WebVulnerabilityScanner
X\Data\Database\vulnscanresults.mdb>
4. FromtheAcunetixWebVulnerabilityScannerProgramGroup,selecttouninstallthe
product.
5. InstallthenewerversionofAcunetixWebVulnerabilityScanner.
6. TorestoretheLoginSequences,copythefilesbackedupin(2)to
<C:\Users\Public\Documents\AcunetixWVSX\LoginSequences>
7. Ifupgradingfromversion7,theReportingdatabaseneedstobeupdatedbeforeitcan
beusedinanewerversion.ThiscanbedoneusingtheReportingDatabaseUpgrade
toolwhichcanbedownloadedfrom
http://www.acunetix.com/download/tools/ConvertWVSDatabase.zip.Proceedasfollows:
IfyouareusinganSQLdatabase,selectMSSQLServer,andspecifythe
Server,credentialsandDatabasewhichneedstobeupgradedandclickon
theConvertbutton.ThenconfigurethenewversionofAcunetixWeb
VulnerabilityScannertousetheupgradeddatabase.


ScreenshotUpgradeReportingDatabase

IfyouareusinganAccessdatabase,selectMSAccess,andselectthe
databasebackedupin(3),andclickontheConvertbutton.Onceready,copy
theupgradeddatabaseto<C:\ProgramData\AcunetixWVS
X\Data\Database\vulnscanresults.mdb>

Installing AcuSensor
AcunetixAcuSensorincreasestheefficiencyofanAcunetixscanbyimprovingthecrawling,
detectionandreportingofvulnerabilities,whiledecreasingfalsepositives.Acunetix
AcuSensorcanbeusedon.NETandPHPwebapplications.

Installing the AcuSensor Agent


NOTE:InstallingtheAcuSensorAgentisoptional.AcunetixWebVulnerabilityScannerisstill
bestinclassasablackboxscannerbuttheAcuSensorAgentimprovesaccuracyand
vulnerabilityresultswhenscanning.NETandPHPwebapplications.
TheuniqueAcunetixAcuSensorTechnologyidentifiesmorevulnerabilitiesthanablackbox
WebApplicationScannerwhilegeneratinglessfalsepositives.Inaddition,itindicatesexactly
wherevulnerabilitiesaredetectedinyourcodeandalsoreportsdebuginformation

AcunetixAcuSensorrequiresanagenttobeinstalledonyourwebsite.Thisagentis
generateduniquelyforyourwebsiteforsecurityreasons.

Generating the AcuSensor files


FirstyouwillneedtogenerateyouruniqueAcuSensorfiles.Proceedasfollows:

1. IfusingAcunetixWVS,openAcunetixWVSandnavigatetotheConfiguration>
ApplicationSettingsnode.ClickontheAcuSensorDeploymentnode.

ScreenshotAcuSensorDeploymentsettingsnode
2.

3.
4.
5.
6.
7.

IfusingAcunetixOnlineVulnerabilityScanner,youcangeneratetheAcuSensorfiles
fromtheScanTargetsconfiguration.FromAcunetixOVS,changetoScanTargets>
ListScanTargets>ClickontheScanTargetsname.Skiptostep6.
Enterapasswordorclickonthepadlockicontorandomlygenerateapassword
uniquetotheAcuSensorfile.
Select'Alsosetpasswordincurrentlyselectedsettingstemplate'tostorethe
passwordspecifiedinthescansettingstemplate.
SpecifythepathwhereyouwanttheAcuSensorfilestobegenerated.
SelectwhethertogeneratefilesforaPHPwebsiteora.NETwebsite.
ClickonGenerateAcuSensorInstallationFilestogeneratethefiles.

8. DependingonifyouareusinganASP.NEToraPHPwebsite,useoneofthe
followingprocedurestoinstalltheAcuSensorfiles.

Installing the AcuSensor agent for ASP .NET Websites


TheAcuSensoragentwillneedtobeinstalledinyourwebapplication.Thissectiondescribes
howtoinstallAcuSensorinanASP.NETwebapplication.

1. InstallPrerequisitesontheserverhostingthewebsite:TheAcuSensorinstaller
applicationrequiresMicrosoft.NETFramework3.5orhigher.

ScreenshotEnableIIS6MetabaseCompatibilityonWindows2008

OnWindows2008,youmustalsoinstallIIS6MetabaseCompatibilityfromControl
Panel>TurnWindowsfeaturesOnorOff>Roles>WebServer(IIS)>Management
Tools>IIS6ManagementCompatibility>IIS6MetabaseCompatibilitytoenable
listingofall.NETapplicationsrunningonserver.

2. CopytheAcuSensorinstallationfilestotheserverhostingthe.NETwebsite.

ScreenshotAcunetix.NETAcuSensorAgentinstallation
3. DoubleclickSetup.exetoinstalltheAcunetix.NETAcuSensoragentandspecifythe
installationpath.Theapplicationwillstartautomaticallyoncetheinstallationisready.
Iftheapplicationisnotsettostartautomatically,clickonAcunetix.NETAcuSensor
TechnologyInjectorfromtheprogramgroupmenu.

ScreenshotAcunetix.NETAcuSensorTechnologyAgent

4. Onstartup,theAcunetix.NETAcuSensorTechnologyInstallerwillretrievealistof
.NETapplicationsinstalledonyourserver.Selectwhichapplicationsyouwouldliketo
injectwithAcuSensorTechnologyandselecttheFrameworkversionfromthedrop
downmenu.ClickonInjectSelectedtoinjecttheAcuSensorTechnologycodeinthe
selected.NETapplications.Oncefilesareinjected,closetheconfirmationwindow
andalsotheAcuSensorTechnologyInjector.

Note:TheAcuSensorinstallerwilltrytoautomaticallydetectthe.NETframeworkversion
usedtodevelopthewebapplicationsoyoudonothavetomanuallyspecifywhichframework
versionwasusedfromtheTargetRuntimedropdownmenu.

Installing the AcuSensor agent for PHP websites


ThissectiondescribeshowtoinstallAcuSensorinanASP.NETwebapplication.

1. LocatethePHPAcuSensorfileofthewebsiteyouwanttoinstallAcuSensoron.Copy
theacu_phpaspect.phpfiletotheremotewebserverhostingthewebapplication.

TheAcuSensoragentfileshouldbeinalocationwhereitcanbeaccessedbythe
webserversoftware.AcunetixAcuSensorTechnologyworksonwebsitesusingPHP
version5andup.
2. Thereare2methodstoinstalltheAcuSensoragent,onemethodcanbeusedfor
Apacheservers,andtheothermethodcanbeusedforbothIISandApacheservers.
Method 1: Apache .htaccess file
Createa.htaccessfileinthewebsitedirectoryandaddthefollowingdirective:
php_valueauto_prepend_file[pathtoacu_phpaspect.phpfile].

Note:ForWindowsuseC:\sensor\acu_phpaspect.phpandforLinuxuse
/Sensor/acu_phpaspect.phppathdeclarationformats.IfApachedoesnotexecute.htaccess
files,itmustbeconfiguredtodoso.Refertothefollowingconfigurationguide:
http://httpd.apache.org/docs/2.0/howto/htaccess.html.Theabovedirectivecanalsobe
configuredinthehttpd.conffile.
Method 2: IIS and Apache php.ini
1. Locatethefilephp.iniontheserverbyusingphpinfo()function.
2. Searchforthedirectiveauto_prepend_file,andspecifythepathtothe
acu_phpaspect.phpfile.Ifthedirectivedoesnotexist,additinthephp.inifile:
auto_prepend_file=[pathtoacu_phpaspect.phpfile]
3. Saveallchangesandrestartthewebserverfortheabovechangestotakeeffect.

Testing your AcuSensor Agent


TotestiftheAcuSensoragentisworkingproperlyonthetargetwebsite,dothefollowing:
1. IntheToolsExplorer,NavigatetoConfiguration>ScanSettingsnodeandselect
theAcuSensornode.
2. EnterthepasswordoftheAcuSensoragentfilewhichwascopiedtothetarget
website.
3. ClickTestAcuSensorinstallationonaSpecificURL.Adialogwillpromptyouto
submittheURLofthetargetwebsitewheretheAcuSensorAgentfileisinstalled.
EnterthedesiredURLandclickOK.

Changing the AcuSensor Password


IfyouneedtochangethepasswordusedbytheAcuSensoragentonyourwebsite,youwill
needtoregeneratetheAcuSensorFilesandreinstallthemonyourwebsite.
Performthefollowingifyouareusinga.NETwebsite:
1. UsetheprocedureinthenextsectiontoDisableandUninstalltheAcuSensoragent.
2. Configureanewpassword.
ThisstepcanbeomittedifyouareusingAcunetixOnlineVulnerabilityScanner,since
anewuniqueandsecurepasswordisautomaticallygeneratedeachtimethe
AcuSensorfilesaregenerated.TheuniquepasswordisstoredwiththeScanTargets
settings.
3. ClickonGenerateAcuSensorinstallationfiles.
4. ProceedwithinstallingthenewAcuSensorfiles.IfyouareusingaPHPweb
application,youwilljustneedtooverwritetheoldacu_phpaspect.phpwiththenew
acu_phpaspect.phpfile.

Disabling and uninstalling AcuSensor


Touninstallanddisablethesensorfromyourwebsite:

AcuSensor for ASP .NET websites


1. BrowsetotheinstallationdirectorywheretheAcuSensorAgentwasbeeninstalled
2. OpenAcuSensorInjector.exe.

ScreenshotSelectwebsiteandclickUninjectSelected

3. SelectthewebsitewheretheAcuSensoragentisinstalledandclickonUninjectto
removetheAcuSensorAgentfromthesite.
4. CloseAcuSensorInjector.exe
5. Fromthesamedirectory,doubleclickuninstall.exetouninstalltheAcuSensorAgent
files.

Note:IfyouuninstalltheAcunetix.NETAcuSensorTechnologyInjectorwithoutuninjecting
the.NETapplication,thentheAcuSensorcodewillnotberemovedfromyour.NET
application.

AcuSensor for PHP


1. Ifmethod1(.htaccessfile)wasusedtoinstallthePHPAcuSensor,deletethe
directive:php_valueauto_prepend_file=[pathtoacu_phpaspect.phpfile]
from.htaccess
2. Ifmethod2wasusedtoinstallthePHPAcuSensor,deletethedirective:
auto_prepend_file=[pathtoacu_phpaspect.phpfile]fromphp.ini.
3. Finally,deletetheAcunetixAcuSensorPHPfile:acu_phpaspect.php.

Note:AlthoughtheAcunetixAcuSensoragentrequiresauthentication,itisrecommended
thattheAcuSensorclientfilesareuninstalledandremovedfromthewebapplicationifthey
arenolongerinuse.

Scanning a Website
NOTE: DO NOT SCAN A WEBSITE WITHOUT PROPER AUTHORIZATION!

ThewebserverlogswillshowyourIPaddressandalltheattacksmadebyAcunetixWeb
VulnerabilityScanner.Ifyouarenotthesoleadministratorofthewebsitepleasemakesure
towarnotheradministratorsbeforeperformingascan.Somescansmightcauseawebsite
tocrash,requiringarestartofthewebsite.

Toscanawebsite,youfirstneedtoperformthefollowingsteps:

Step 1: Select Target(s) to Scan


1. ClickonFile>New>NewWebsiteScantostarttheScanWizard,orclickthe
New
Scan
buttononthetoplefthandoftheAcunetixWebVulnerabilityScannermenu
bar.

ScreenshotScanWizard:SelectScanType

2. Specifythescanoptions:
a. ScansinglewebsiteEntertheURLofthetargetwebsite,e.g.
http://testphp.vulnweb.com.
b. ScanusingsavedcrawlingresultsIfyoupreviouslyperformedacrawlona
website,youcanusethesavedresultstolaunchascaninsteadofhavingto
crawlthewebsiteagain.
3. Click
Next
tocontinue.

Note:
The

AcunetixWebVulnerabilityScanner

Scheduler

canbeusedtoscanwebsites
ataspecifictimeandtoconfigurerecurringscans.

Step 2: Specify Scanning Profile, Scan Settings Template and Crawling


Options

ScreenshotScanningProfileandScanSettingstemplate

Scanning Profile
TheScanningProfile

willdeterminewhichtestsaretobelaunchedagainstthetarget
website.Forexample,ifyouonlywanttotestyourwebsite(s)forSQLinjection,selectthe
profilesql_injection.Noadditionaltestswillbeperformed.TheDefaultscanningprofilewill
testyourwebsiteforallknownwebvulnerabilities.RefertotheScanningProfilessectionfor
moreinformationonhowtocustomizeorcreatescanningprofiles.

Scan Settings template


TheScanSettingstemplatewilldeterminewhatCrawlerandScannersettingsaretobe
usedduringascan.RefertotheScanSettingstemplatessectionformoreinformationon
howtocustomizeorcreatenewScanSettingstemplates.

Advanced Crawling Options


Ticktheoption
Showadvancedoptionsinthescanwizard
toproceedtotheAdvanced
Crawloptions,allowingyouto
preseedacrawlusingSeleniumscripts,FiddlerSession
Archives,BurpSavedfilesandAcunetixHTTPSnifferlogfiles
.Youcanalsoconfigurethe
AcunetixtoshowyouthelistoffilesidentifiedbytheCrawler,givingyoutheoptionto
choosewhichfilestoscan.

Step 3: Confirm Targets and Technologies Detected

ScreenshotScanWizardSelectingTargetsandTechnologies

AcunetixWebVulnerabilityScannerwillautomaticallyfingerprintthetargetwebsiteforthe
serversoperatingsystem,thewebserveranditswebservertechnologies.Theweb
vulnerabilityscannerwillreducethescantimebyscanningonlyfortheselectedweb
technologies.E.g.AcunetixWebVulnerabilityScannerwillnotlaunchIISsecuritychecks
againstaLinuxsystemrunninganApachewebserver.
Clickontherelevantfieldandchangethesettingsfromtheprovidedcheckboxesifyou
wouldliketoaddorremovescansforspecifictechnologies.

Note:
Ifaspecificwebtechnologyisnotlistedunder
Optimizeforthefollowing
technologies
,itdoesnotmeanthatitisunsupportedbyWebVulnerabilityScanner,only
thattherearenovulnerabilitytestsexclusivetothattechnology.

Step 4: Configure Login for Password Protected Areas


TwotypesofLoginmechanismsarecommonlyusedontheweb:
HTTPAuthentication
Thistypeofauthenticationishandledbythewebserver,wherethe
userispromptedwithapassworddialog.ScanninganHTTPpasswordprotectedarea
requiresthatyoueitherenterthecredentialsduringthecrawlingofyourwebapplication,or
youhavethecredentialspreconfiguredinAcunetix.Thisiscoveredinmoredetail
here
.
FormsAuthentication
Thistypeofauthenticationishandledviaawebformandnotvia
HTTP.Thecredentialsaresenttotheserverforvalidationbyacustomscript.Scanning
websitesusingformsbasedauthenticationisdoneusingtheLoginSequenceRecorderand
iscoveredinmoredetail
here
.

Step 5: Finalize Scan Options

ScreenshotFinalizeScanOptions

BeforetheScanisstarted,theScanWizardwillreportissueswhichmighthinderthescan.
Thefollowingisalistofactionswhichyoumightbepresentedwith:
Ifanerrorisencounteredwhileconnectingtothetargetserver,theerrorwillbe
shown.
IfAcunetixWebVulnerabilityScannerisunabletoautomaticallydetectacustom404
errorpagepattern,youwillhavetoconfigureacustom404errorpagerulebyclicking
the
Customize
button.
Readmore
aboutconfiguringAcunetixtohandleCustom404
errorpages.
IfthetargetserverisusingCASEinsensitiveURLs,youmustforcecaseinsensitive
crawling.ThiscanbedonefromConfiguration>ScanSettings>CrawlingOptions>
IgnoreCASEdifferencesinpaths.

IfAcuSensorTechnologyisenabledandthetargetserverisrunningPHPor.NET,
youwillgetanerroriftheAcuSensoragentisnotdetected.Clickthe
Customize
buttonto
installAcuSensoronthetargetwebapplication
.
Ifadditionalhostshavebeenfoundtobelinkedtofromthewebsitebeingscanned,
youcanoptionallyselecttoscanthesetoo.Youwillrequirepermissionstoscanthe
selectedhoststoo.
Ifasmartphonefriendlyversionofthewebsiteisdetected,youwillbegiventhe
optiontocrawlandscanthesiteasanormalbrowseroramobilebrowser.
IfyouhavemadechangestotheScanSettingstemplate,youwillbeaskedifyou
wanttosavethemodificationstotheexistingornewtemplate.

Step 6: Start the scan


Clickon
Finish
tostarttheautomatedscan.Iftheoption
Aftercrawlingletmechoosethe
filestoscan
wasselectedinthecrawlingoptions,youwillbeaskedtoselectthefilesto
scanafterAcunetixWebVulnerabilityScannerhasfinishedcrawlingthesite.

Dependingonthesizeofthewebsite,scanningprofileselected,andtheserversresponse
time,ascanmaytakeseveralhours.

Analyzing the Scan Results

Thevulnerabilitiesdiscoveredduringthescanofawebsitearedisplayedinrealtimeinthe
AlertsnodeintheScanResultswindow.ASiteStructurenodeisalsoshownlistingthefiles
andfoldersdiscovered.

ScreenshotScanResultsshowingAlertsSummary

Web Alerts
TheWebAlertsnodedisplaysallvulnerabilitiesfoundonthetargetwebsite.WebAlertsare
categorizedaccordingto4severitylevels:

HighRiskAlertLevel3Vulnerabilitiescategorizedasthemostdangerous,whichputasite
atmaximumriskforhackinganddatatheft.

MediumRiskAlertLevel2Vulnerabilitiescausedbyservermisconfigurationandsitecoding
flaws,whichfacilitateserverdisruptionandintrusion.

LowRiskAlertLevel1Vulnerabilitiesderivedfromlackofencryptionofdatatraffic,or
directorypathdisclosures.

InformationalAlertTheseareitemswhichhavebeendiscoveredduringascanandwhich
aredeemedtobeofinterest,e.g.thepossibledisclosureofaninternalIPaddressoremail
address,ormatchingasearchstringfoundintheGoogleHackingDatabase

Moreinformationaboutthevulnerabilityisshownwhenyouclickonanalertcategorynode:
VulnerabilitydescriptionAdescriptionofthediscoveredvulnerability.The
AcuSensorlogoisdisplayedintheVulnerabilityDescriptionforthevulnerabilitiesthat
aredetectedusingtheAcuSensorTechnology.
AffecteditemsThelistoffilesvulnerabletothediscoveredvulnerability.
TheimpactofthisvulnerabilityLevelofimpactonthewebsiteorwebserverif
thisvulnerabilityisexploited.
AttackdetailsDetailsabouttheparametersandvariablesusedtotestforthis
vulnerability.E.g.foraCrossSiteScriptingalert,thenameoftheexploitedinput
variableandthestringitwassettowillbedisplayed.YoucanalsofindtheHTTP
requestsenttothewebserverandtheresponsesentbackbythewebserver
(includingtheHTMLresponse).Theattackcanbeinspectedandrelaunched
manuallybyclickingLaunchtheattackwithHTTPEditor.Formoreinformation,
pleaserefertohttp://www.acunetix.com/blog/docs/httpeditor/.
HowtofixthisvulnerabilityGuidanceonhowtofixthevulnerability.
DetailedinformationMoreinformationaboutthereportedvulnerability.
WebreferencesAlistofweblinksprovidingmoreinformationonthevulnerabilityto
helpyouunderstandandfixit.

Marking an Alert as a False Positive


Ifyouarecertainthatthevulnerabilitydiscoveredisafalsepositive,youcanflagthealertasa
FalsePositivetoavoiditbeingreportedinsubsequentscansofthesamewebsite.Todo
this,clickontheMarkalertasfalsepositivelinkorrightclickonthealertandselectthe
menuoption.
YoucanremoveanalertfromthefalsepositiveslistbynavigatingtotheConfiguration>
ApplicationSettingsnodeintheToolsExplorerandselecttheFalsePositivesnode.

Network Alerts

ScreenshotNetwork,PortScannerandKnowledgebasenodes

TheNetworkAlertsnodedisplaysnetworklevelvulnerabilitiesdiscoveredinscannednetwork
services,suchasDNS,FTP,SMTPandSSHservers.Networkalertsarecategorizedinto4
severitylevels(similartowebalerts).Thenumberofvulnerabilitiesdetectedisdisplayedin
brackets()nexttothealertcategories.Clickanalertcategorynodetoviewmoreinformation
(similartowebalerts).
Note:YoucandisablenetworksecuritychecksbyuntickingtheEnablePortScanning
optionintheScanWizard.NetworkSecurityChecksareonlyperformedonopenports
detectedduringthescan,thusdisablingportscanningwilleffectivelydisableallthenetwork
securitychecks.

Port Scanner
ThePortScannernodedisplaysallthediscoveredopenportsontheserver.Networkservice
bannerscanbeviewedbyclickingonanopenport.

Note:PortScanningofthetargetservercanbeenabledordisabledfromAcunetixWVS>
Configuration>ScanSettings>ScanningOptions>EnablePortScanning.

Knowledge Base
Theknowledgebasenodeisahighlevelreportthatdisplays:
ListofopenTCPportsfoundontheserver,includingtheportbanner.
ListofNetworkServicesrunningonthewebserverandtheirresponse.
Listoffileswithinputsfoundonthewebsite.Thenumberofinputsperfilearealso
shown.
Listoflinkstoexternalhostsfoundonthewebsite.E.g.testphp.vulnweb.com
containsalinktowww.acunetix.com.
ListofClientandServerHTTPerrorresponsestogetherwiththeHTTPrequeststhat
generatedthem.AnexamplewouldbetheresponsecodeServerInternalError
HTTP500.Checktheresponseforinformationexposure.

Site Structure
TheSiteStructureNodedisplaysthelayoutofthetargetwebsiteincludingallfilesand
directoriesdiscoveredduringthecrawlingprocess.


ScreenshotSiteStructure

IntheCrawlerresults(SiteStructurenode),colorcodesareusedtoshowdifferentfile
statuses.Thefilenamecolorcodingisasfollows

GreenThesefileswillbetestedwithAcuSensorTechnology,resultinginmore
advancedsecuritychecksandlessfalsepositivealerts.FromtheAcuSensordata
tab,theusercanseewhatdatarelatedtothesefilesisbeingreturnedbythe
AcuSensor.SuchinformationisusefultoknowwhatSQLquerieswereexecutedorif
theselectedfileisusingfunctionswhicharemonitoredbyAcuSensor.
BlueFilewasdetectedduringavulnerabilitytestandnotbythecrawler.Most
probablysuchfilesarenotlinkedfromanywhereonthetargetwebsite.
BlackFilesdiscoveredbythecrawler.

Foreverydiscovereditem,moredetailedinformationisavailableintheinformationpaneon
therighthandside:
InfoGenericinformationsuchasfilename,pagetitle,path,length,URLetc.
ReferrersThefilesorpagesthatlinkedtothetestedfile.
HTTPHeadersTheHTTPheadersoftherequestsenttothewebservertoretrieve
theselectedfile,andtheHTTPresponseheadersreceived.
InputsPossibleinputparametersandvaluesforthefile.
ViewSourceThesourceHTMLofthepage.
ViewPageThepageisdisplayedasitisshowninawebbrowser.Mostclientside
scriptsaredisabledinthistabforsecuritypurposestoavoidlaunchingvulnerabilities
againstthecomputeronwhichAcunetixWebVulnerabilityScannerisrunning.

AcuSensorDataAnyAcuSensorTechnologydatareturned.
AlertsAlistofalertsfortheselectedfile.

Inaddition,eachitemcontainstheHTMLStructureAnalysis,whichincludes:
Alistoflinksdiscoveredinthefile.
Commentsdiscoveredintheselectedpage.Theinformationcontainedinthe
commentscannotbeautomaticallyanalyzedbutmayrevealinterestinginformation
abouttheconstructionandcodingofthewebsite.
Anyclientsidescripts(JavaScript,VBScriptetc.)andtheirsourcecodediscoveredin
theselectedpage.Theclientwebbrowserwillexecutethesescripts.Thismight
revealinformationaboutthelogicofthewebapplication.
Anyformsdiscoveredintheselectedobjectareshowninthetopwindow.Alistof
parametersandtheirpossiblevaluesareshowninthemiddleandbottomwindow.
AlistofMETAtagsdiscoveredintheselectedobject.METAtagscontaininformation
aboutthewebsite,e.g.thedescriptionandkeywordsMETAtagsusedbysearch
engines.METAtagswithanHTTPEQUIVattributeareequivalenttoHTTPheaders.
Typically,suchMETAtagscontroltheactionofbrowsersandmaybeusedtorefine
theinformationprovidedbytheactualheaders.Tagsusingthisformshouldhavean
equivalenteffectwhenspecifiedasanHTTPheader,andinsomeserversmaybe
translatedtoactualHTTPheadersautomaticallyorbyapreprocessingtool.

Grouping of Vulnerabilities

ScreenshotGroupingofvulnerabilities

Ifthesametypeofvulnerabilityisdetectedonmultiplepages,thescannerwillgroupthem
underonealertnode.Expandingthealertnodewillrevealallthevulnerablepages.Expand
furthertoviewthevulnerableparametersfortheselectedpage.

Saving / Loading Scan Results


Whenascaniscompletedyoucansavethescanresultstoanexternalfileforanalysisand
comparisonatalaterstage.Thesavedfilewillcontainallthescansfromthecurrentsession
includingalertinformationandsitestructure.
TosavethescanresultsclicktheFilemenuandselectSaveScanResults.
ToloadthescanresultsclicktheFilemenuandselectLoadScanResults.

Scanning Web Services

WebServices,likeanyotherinternetdependentsystems,presentnewexploitpossibilities
andincreasetheneedforsecurityaudits.TheWebServicesScannerperformsautomated
vulnerabilityscansforWebServicesandgeneratesadetailedsecurityreportoftheresults.

Screenshot66WebServicesScanner

Starting a Web Service Scan


1. FromtheToolsExplorerselectWebServicesScannerandclicktheNewScan
buttoninthetoolbartolaunchtheWebServiceScanWizard.SpecifytheURLofan
onlineorlocalWSDLandchooseascanningprofile.ClickNexttoproceed.
2. IntheSelectionstep,selecttheWebServices,PortsandOperationsthatmustbe
scanned.ThenumberofinputsacceptedbyeachoperationandtheURLoftheports
willbedisplayedintheDetailssection.
3. Enterspecificinputvalues(optional)forthescannertouseasWebService
OperationsintheDefaultValuesstep.
4. Proceedtothescansummary,reviewitandclickFinishtolaunchthescan.

Web Services Editor

Screenshot67WebServicesEditor

TheWebServicesEditorallowsimportingofonlineorlocalWSDLforcustomeditingand
executionofvariouswebserviceoperations,foranindepthanalysisofWSDLrequestsand
responses.Theeditoralsofeaturessyntaxhighlightingforalllanguages,makingiteasyto
editSOAPheadersandcustomizemanualattacks.EditingandsendingofWebServices
SOAPmessagesisverysimilartoeditingnormalrequestssentviatheHTTPEditor.

Importing WDSL and Sending Request


1. ClickontheWebServicesEditornodeinthetoolsexplorerandentertheURLofthe
WSDL,orlocatethelocaldirectorywherethelocalWSDLfileisstored.ClickImport
toimportallWSDLinformation.
2. Fromthedropdownmenusinthetoolbar,selecttheService,PortandOperationthat
mustbetested.
3. SpecifyavaluefortheoperationandclickSendtopasstheSOAPrequesttotheweb
service.ThewebserverresponsecanthenbeviewedinastructuredorXMLview
typeinthelowerwindowpane.

Response Tab
DisplaystheresponsesentbackfromthewebserviceinrawXMLformat.

Structured Data Tab


PresentstheXMLdatareceivedfromthewebserviceresponseusingahierarchyofnodes
thatshowthevalueforeachelement.

WSDL Structure Tab


PresentsadetailedviewofthewebservicedataasprovidedbytheWSDLStructure.
TheWSDLinformationisstructuredintheformofnodesandsubnodesandthemainnodes
ofthetreestructureareXMLSchemaandServices.

TheXMLSchemanodelistsalltheComplexTypesandtheElementsofthewebservice.The
Servicesnodelistsallthewebserviceportsandtheirrespectiveoperationstogetherwiththe
resourcedetailsofthesourceoftheSOAPdata.
AmoredetailedWSDLstructurecanalsobeshownbytickingtheShowdetailedWSDL
structureatthebottomofthescreen.Thiswillprovideextensiveinformationforeach
subnodeoftheServicesnodestructuresuchasinputmessagesandparameters.

WSDL Tab
ThistabshowstheactualWDSLdataintheformofXMLtags.Usingthetoolbarprovidedat
thebottomofthescreenyoucansearchforcertainkeywordsorelementsinthesourcecode
andalsochangethesyntaxhighlightingifneeded.

HTTP Editor Export


IntheWebServicesEditoryoucanexportaSOAPrequesttotheHTTPEditorbyclickingon
theHTTPEditorbuttonintheWebServicesEditortoolbar.TheHTTPEditortoolwill
automaticallyimportthedatasotherequestcanbecustomizedandsentasanHTTPPOST
request.

Generating Reports

ScreenshotTheReporterApplication

TheAcunetixWebVulnerabilityScannerReporterisastandaloneapplicationthatallowsyou
togeneratereportsforthesecurityscansperformedusingAcunetixWebVulnerability
Scanner.TheReportercanbelaunchedaftercompletingascan,orfromtheAcunetixWeb
VulnerabilityScannerprogramgroup,andcanbeusedtogeneratevarioustypesofreports
includingdeveloperreports,executivereports,compliancestandardreportsorareportthat
comparestheresultsoftwoscans.

Generating a Report from the Scan Results


Therearetwowaystogenerateareport.Afterscanningasite,clickonthe Reportbutton
ontheAcunetixtoolbar.ThiswillstarttheAcunetixWebVulnerabilityScannerReporterand
willloadtheDefaultReportforthescan.TheDefaultReportusedcanbeselectedfromthe
ReporterSettings.


ScreenshotSampleReport

ThesecondmethodistoloadtheAcunetixWebVulnerabilityScannerReporterfromthe
AcunetixWebVulnerabilityScannerProgramGroup.Thiswillallowyoutoreportonthe
scansthathavebeensavedtotheReportsdatabase.

1. FromtheReportslist,selectthetypeofreportandclickonReportWizard.
2. InthecaseofComplianceReport,selecttheRegulatorybodyorStandardtobeused
inthereport.ClickNext.


ScreenshotSelectComplianceReport

3. Youcanthenselecttoshowtheresultsofallthescansstoredinthereports
databaseortofilterthescansthataredisplayedbasedonspecificscancriteria.Click
Next.


ScreenshotFilterScans

4. Selectthescanthatyouwouldliketoreporton.

ScreenshotSelectScan

5. Selectwhatpropertiesanddetailsthereportshouldinclude.TheReportProperties
willvarydependingonthetypeofreportthatyouaregenerating.


ScreenshotSelectReportProperties

6. ClicktheGeneratebuttontogeneratethereport.
7. Oncethereportisgenerated,itcanbeprintedorexportedinvariousformats
includingPDF,WordandHTML.

Reporter Settings
TheReportersettingsallowyoutoconfigurethelayoutandstyleofthegeneratedreports.To
accessthereportsettingsnavigatetotheConfiguration>SettingsnodeintheReporter
ToolsExplorer.
FromtheReportOptionsnode,youcancustomizethelayout,titles,andimagesinthe
headersofthereport.


ScreenshotReporterOptions

GeneralSettingsConfigurethedefaultreporttemplateforgeneratingareport.
ReportOptionsSelectcustomicons,logos,headersandfooterstocustomizethereport.
FromthePageSettingsnodeyoucanconfigurethedefaultpagesize,orientationand
marginsofyourreports.
Thesesettingswillapplytoallreports.

Saving Reports
Onceyouhavegeneratedyourreport,youcanusethetoolbaratthetoptosavethereportin
PRE(preparedreports)format,whichwillallowyoutoreviewthereportlater.Youcanalso
exportthereporttoPDF,HTML,Text,WordDocumentandBMPorprintthereport.

Changing the Reporter Database


AcunetixWebVulnerabilityScannerstoresthescanresultsinabackenddatabase.By
default,MicrosoftAccessisused.YoumightwanttoswitchtousingMicrosoftSQLserver.
Thisisrecommendedwhenscanningalotofsitesorlargersites.Thiscanbedoneas
follows:
1. NavigatetotheConfiguration>ApplicationSettings>DatabasenodeintheAcunetix
WebVulnerabilityScannerinterface.SelectMSSQLServerfromtheDatabaseType
dropdownmenu.

2. EntertheServerIPorFQDNintheServertextboxandthecredentialstoconnectto
theserverintheUsernameandPasswordtextbox.OnlySQLAuthenticationis
supported.
3. SpecifyadatabasenameintheDatabasetextbox.Ifthedatabasedoesnotexistit
willbeautomaticallycreated.Ifthedatabasespecifiedalreadyexists,youwillbe
promptedwithaconfirmationtooverwritethecurrentdatabasestructureanddata.

Note:ThecreationofthedatabaserequiresauserwithSQLAdministratorprivileges.Once
thedatabaseiscreated,youcanchangetheSQLcredentialstoauseraccountwithread
andwritepermissionsonthedatabase.
Itisalsopossibletoimportadatabaseconfigurationfile.SelectImportDatabase
Configurationandselecta*.dbconfigfilegeneratedbytheAcunetixEnterpriseReporterto
automaticallyimportSQLdatabasesettings.

Acunetix Reports

ThefollowingisalistofthereportsthatcanbegeneratedfromAcunetixWebVulnerability
Scanner(WVS)andAcunetixOnlineVulnerabilityScanner(OVS):

Affected Items Report


Availability:OVSandWVS
TheAffectedItemsreportshowsthefilesandlocationswherevulnerabilitieshavebeendetected
duringascan.Thereportshowstheseverityofthevulnerabilitydetected,togetherwithother
detailsabouthowthevulnerabilityhasbeendetected.

Developer Report
Availability:OVSandWVS
TheDeveloperReportistargetedtodeveloperswhoneedtoworkonthewebsiteinorderto
addressthevulnerabilitiesdiscoveredbyAcunetixWebVulnerabilityScanner.Thereport
providesinformationonthefileswhichhavealongresponsetime,alistofexternallinks,email
addresses,clientscriptsandexternalhosts,togetherwithremediationexamplesandbest
practicerecommendationsforfixingthevulnerabilities.

Executive Report
Availability:OVSandWVS
TheExecutiveReportsummarizesthevulnerabilitiesdetectedinawebsiteandgivesaclear
overviewoftheseveritylevelofvulnerabilitiesfoundinthewebsite.

Quick Report
Availability:OVSandWVS
TheQuickReportprovidesadetailedlistingofallthevulnerabilitiesdiscoveredduringthescan.

Network Security Report


Availability:OVSonly
TheNetworkSecurityReportprovidesdetailedsecurityinformationabouttheperimeternetwork
serverscannedbyAcunetixOnlineVulnerabilityScanner.Thisinformationisveryusefulfora
networksecurityauditororpentesterwhoistaskedwithanalysingthesecurityoftheperimeter
network.

Compliance Reports

ScreenshotPCIComplianceReport

ComplianceReportsareavailableforthefollowingcompliancebodiesandstandards:

CWE / SANS Top 25 Most Dangerous Software Errors


Availability:OVSandWVS
Thisreportshowsalistofvulnerabilitiesthathavebeendetectedinyourwebsitewhicharelisted
intheCWE/SANStop25mostdangeroussoftwareerrors.Theseerrorsareofteneasytofind
andexploitandaredangerousbecausetheywilloftenallowattackerstotakeoverthewebsiteor
stealdata.Moreinformationcanbefoundathttp://cwe.mitre.org/top25/.

The Health Insurance Portability and Accountability Act (HIPAA)


Availability:OVSandWVS
PartoftheHIPAAActdefinesthepolicies,proceduresandguidelinesformaintainingtheprivacy
andsecurityofindividuallyidentifiablehealthinformation.Thisreportidentifiesthevulnerabilities
thatmightbeinfringingthesepolicies.Thevulnerabilitiesaregroupedbythesectionsasdefined
intheHIPAAAct.

International Standard ISO 27001


Availability:OVSandWVS
ISO27001,partoftheISO/IEC27000familyofstandards,formallyspecifiesamanagement
systemthatisintendedtobringinformationsecurityunderexplicitmanagementcontrol.This
reportidentifiesvulnerabilitieswhichmightbeinviolationofthestandardandgroupsthe
vulnerabilitiesbythesectionsdefinedinthestandard.

NIST Special Publication 800-53


Availability:OVSandWVS
NISTSpecialPublication80053coverstherecommendedsecuritycontrolsfortheFederal
InformationSystemsandOrganizations.Onceagain,thevulnerabilitiesidentifiedduringascan
aregroupedbythecategoriesasdefinedinthepublication.

OWASP Top10 2013


Availability:OVSandWVS
TheOpenWebApplicationSecurityProject(OWASP)iswebsecurityprojectledbyan
internationalcommunityofcorporations,educationalinstitutionsandsecurityresearchers.
OWASPisrenownforitsworkinwebsecurity,specificallythroughitslistoftop10websecurity
riskstoavoid.ThisreportshowswhichofthedetectedvulnerabilitiesarefoundontheOWASP
top10vulnerabilities.

Payment Card Industry (PCI) standards


Availability:OVSandWVS
ThePaymentCardIndustryDataSecurityStandard(PCIDSS)isaninformationsecurity
standard,whichappliestoorganizationsthathandlecreditcardholderinformation.Thisreport
identifiesvulnerabilitieswhichmightbreachpartsofthestandardandgroupsthevulnerabilities
bytherequirementthathasbeenviolated.

Sarbanes Oxley Act


Availability:OVSandWVS
TheSarbanesOxleyActwasenactedtopreventfraudulentfinancialactivitiesbycorporations
andtopmanagement.Vulnerabilitieswhicharedetectedduringascanwhichmightleadtoa
breachinsectionsoftheActarelistedinthisreport.

DISA STIG Web Security


Availability:OVSandWVS
TheSecurityTechnicalImplementationGuide(STIG)isaconfigurationguideforcomputer
softwareandhardwaredefinedbytheDefenseInformationSystemAgency(DISA),whichpartof
theUnitedStatesDepartmentofDefense.Thisreportidentifiesvulnerabilitieswhichviolate
sectionsofSTIGandgroupsthevulnerabilitiesbythesectionsoftheSTIGguidewhicharebeing
violated.

Web Application Security Consortium (WASC) Threat Classification


Availability:OVSandWVS
TheWebApplicationSecurityConsortium(WASC)isanonprofitorganizationmadeupofan
internationalgroupofsecurityexperts,whichhascreatedathreatclassificationsystemforweb
vulnerabilities.ThisreportgroupsthevulnerabilitiesidentifiedonyoursiteusingtheWASCthreat
classificationsystem.

Scan Comparison Report

ScreenshotScanComparisonReport

Availability:WVSonly

TheScanComparisonReportallowstheusertotrackthechangesbetweentwoscanresultsfor
thesameapplication.Thisreportwillhighlightresolved,unchangedandnewvulnerabilities,
makingiteasytotrackdevelopmentchangesaffectingthesecurityofyourwebapplication.

Monthly Vulnerabilities Report


Availability:WVSonly
Thisstatisticalreportcorrelatesthedatafromthescansperformedinaspecificmonth,and
reportsonthevulnerabilitiesidentifiedduringthatmonth.

Scheduling Scans

TheSchedulerapplicationallowsyoutoschedulescansataconvenienttimewithout
requiringAcunetixWebVulnerabilityScannerortheAcunetixWebVulnerabilityScanner
SchedulerInterfacetoberunning.

ConfiguringtheSchedulerservice
TheAcunetixSchedulerhasawebbasedinterfacethatcanbeconfiguredthroughthe
AcunetixWebVulnerabilityScannerapplicationsettings.ToaccesstheSchedulerservice
settingsnavigatetoConfiguration>ApplicationSettings>Schedulernode.
ConfiguringtheSchedulerwebinterface

ScreenshotSchedulerwebinterfaceconfiguration

Bydefault,theSchedulerwebinterfaceisonlyaccessiblevialocalhostandonport8181
(http://localhost:8181).IfyouwouldliketheSchedulerwebinterfacetobeaccessiblefrom
otherremotecomputers,ticktheAllowremotecomputerstoconnectoption.When
enabled,youwillbepromptedtospecifyausernameandpasswordforHTTPStobe
automaticallyenabled.Forsecurityreasons,logincredentialsmustalwaysbedefinedwhen
theschedulerwebinterfaceisconfiguredtobeaccessedremotely.
Note:WhenyouchangeanyoftheWebInterfacesettings,uponclickingtheApplybutton
restarttheAcunetixWVSSchedulerservicefromtheWindowsServicesconsole.
ScanOptions

ScreenshotSchedulerscanoptions

IntheSchedulerScanOptions,youcanspecifythepathwheretheAcunetixWeb
VulnerabilityScannerscanresultsshouldbesaved.Bydefault,thescanresultsaresavedin
theMyDocumentsfolderoftheWindowsPublicuserprofileintheAcunetixWVSsub
directory.
Scanningmultiplewebsites
FromthissectionyoucanalsoconfigurethenumberofparallelscanslaunchedinAcunetix
WebVulnerabilityScanner.E.g.ifyouwanttoscan4websitesandtheirscanschedule

overlaps,insteadofthescansbeingqueued,anotherinstanceofAcunetixWebVulnerability
Scannerisautomaticallystartedandthescanswillbelaunchedinparallel.Ifyouare
scanningalargenumberofwebsitesitissuggestedtoincreasethenumberofparallelscans
sotheirscheduledoesnotoverlap.Maximumnumberofparallelscansis10ifyouhavethe
x10instanceslicense.
Note:ThemaximumnumberofscheduledscansthatcanbeconfiguredintheAcunetixWeb
VulnerabilityScannerscheduleris2000.
ConfiguringEmailnotifications

ScreenshotScheduleremailnotifications

Inthissectionyoucanspecifythesettingsforemailnotifications,suchasSMTPserverIPor
FQDN,port,SMTPserverauthentication(optional)andtheemailaddresswherenotifications
willbesent.
Excludedhourstemplates

ScreenshotExcludedHoursTemplates

IntheExcludedHoursTemplatessectionyoucanspecifyarangeofhourstopause
ongoingscans.E.g.ifyoudonotwanttoscanyourwebsiteduringtimesofhightraffic.


ScreenshotExcludedHoursConfiguration

ToaddanewExcludedHoursTemplateclickontheAddbuttonandthen:
1. SpecifyanameofthetemplateintheNameinputfield.
2. Highlightthehoursofthedaywhenscansshouldnotrun.
3. ClickOKtosavethenewtemplate.

Note:Ifascanisstillrunningduringtheexcludedhours,thescanwillbeautomatically
pausedandresumedagainwhenscanningisallowed.

CreatingaScheduledscan
1. AccesstheSchedulerinterfacebyclickingtheSchedulerIcon onthetoolbarinthe
AcunetixWebVulnerabilityScannerinterface,orbrowsehttp://127.0.0.1:8181usinga
webbrowser.
Note:JavaScriptshouldbeenabledtoaccesstheAcunetixSchedulerwebinterface.

ScreenshotAcunetixSchedulerwebinterface

2. ClickontheNewscanbuttontoaddanewscan.Youcanaddasmanyscansas
youwish.Ifthescanscheduleoverlaps,theywillbescannedinparallel.Youcan
increaseordecreasethenumberofparallelscansfromtheSchedulerconfiguration
intheAcunetixWebVulnerabilityScannerapplicationsettings.
3. Ifyouwouldliketoimportanumberofscans(upto2,000)usingaCSVfile,clickon
theImportCSVbutton.Youcanreadmoreaboutthisfeaturelaterinthischapter.

ScheduledScanBasicOptions

ScreenshotAcunetixSchedulerBasicoptions

TheBasicOptionsallowyoutospecifywhichtarget/stoscanaswellasthescanrecursion.
TherecursionoptiongivesyoutheoptiontoconfiguretheSchedulertorunascanOnce,
EveryDay,EveryWeek,EveryMonthorContinuous.Setaspecificdaynumberifschedule
issettoweeklyormonthly,e.g.2nddayoftheweekor21stdayofthemonth.
ScheduledScanAdvancedOptions

ScreenshotAcunetixSchedulerAdvancedoptions

TheAdvancedOptionsallowyoutoconfigure:

ScanningProfile

LoginSequence

ScanSettingstemplate

ScanMode

ExcludedHoursTemplate

Scheduledscanresultsandreports

ScreenshotAcunetixSchedulerScanresultsandReports

IntheScanresultsandreportssection,youcanselecttosavethescanresultstothe
reportingdatabase,savethescanlogs,andgenerateareport.Youcanalsospecifyinwhich
formatyouwantthereporttobegeneratedandanemailaddresswherethescanresultsare
sent.Ifnoemailaddressisspecified,theemailaddressconfiguredintheschedulersettings
isused.
Inaddition,theReporttemplatefieldallowsyoutospecifywhatreporttemplatetouse.You
canchooseamongfourtemplateswhichareAffectedItems,DeveloperReport,Executive
SummaryandQuickReport.

ImportingSchedulingScans
YoucanalsoimportscheduledscansfromaCSVfile.TheformatoftheCSVfilesare
describednext.
CSVFileProperties
EachlineintheCSVfileshouldonlycontainonescan.Foreachscanyoushouldspecifythe
followingproperties:

URLSpecifytheURLwithorwithoutprotocol(httpandhttps).Ifnoprotocolis
specified,httpisused.Thisentryismandatory.

DateSpecifythedatewhenthescanshouldbelaunched.Thedateformatis
DDMMYYYYandshouldbesinglestring.E.g.Ifascanistobescheduledforthe5thof
November2014,thedateshouldbe05112014.Thisentryismandatory.

TimeSpecifythetimewhenthescanshouldbelaunched.Thetimeformatis24
hoursandshouldbeasinglestringof4digits.E.g.10amshouldbe1000and10pm
shouldbe2200.Thisentryismandatory.

ScanningProfileSpecifythenameofanexistingscanningprofiletobeusedduring
thescan.Ifnotspecified,thedefaultscanningprofilewillbeusedduringthescan.

LoginSequenceSpecifythenameofanexistingloginsequenceifyouwanttouse
aloginsequenceduringthescan.Ifnothingisspecified,nologinsequencewillbe
usedduringthescan.

ScanSettingsSpecifythenameofanexistingscansettingstemplate.Ifnoscan
settingstemplateisspecified,thedefaultscansettingstemplatewillbeused.

ScanModeSpecifythescanmodetobeusedduringthescan.Theoptionsare
quick,heuristicandextensive.Ifnoscanmodeisspecified,thedefaultscanmode
willbeused.

GenerateReportSpecifyifareportshouldbegeneratedafterthescan.The
optionsareyesorno.Ifnothingisspecified,noreportwillbegenerated.

ReportFormatIfyouspecifiedthegeneratereportoption,thenyouhavetospecify
thereportformataswell.TheoptionsavailablearePDF,RTF,REPorHTML.Ifyou
donotspecifyanyformat,aPDFreportwillbegenerated.

NotificationEmailAddressSpecifytheemailaddresswheretheemailshouldbe
sentuponcompletionofthescan.Ifanemailisnotspecified,thedefaultemail
addressconfiguredintheAcunetixWebVulnerabilityScannerGUIwillbeused.

Ifyouwouldliketoomitanentrysothedefaultvalueisused,simplyleaveaspacebetween
thecommas.Someexamplesfollow:
Example1:Toscantestphp.vulnweb.comonthe5thofNovember2014at10pmusingthe
defaultvalues,usethebelowlineintheCSVfile:
http://testphp.vulnweb.com,05112014,2200,,,,,,,
Example2:Toscantestasp.vulnweb.comonthe5thofNovember2014at3:15pmusingthe
XSS(Crosssitescripting)scanningprofile,withoutloginsequence,defaultscansettings,
usingtheextensivescanningmode,generateaPDFreportandsendtheresultsto
results@myemail.com,usethebelowexample:
http://testasp.vulnweb.com,05112014,1515,XSS,,
,extensive,yes,PDF,results@myemail.com
Note:ScansimportedfromaCSVfilewillonlybeexecutedonce.Itisnotpossibleto
configurerecurringscansusingtheCSVfileimportfeature.

Troubleshooting and Support


User Manual
Themostcommonqueriescanbeansweredbyconsultingthisusermanual.

Frequently Asked Questions


Oursupportteammaintainsalistoffrequentlyaskedquestionsat
http://www.acunetix.com/support/faq/.

Acunetix Blog
Wehighlyrecommendthatyoufollowoursecurityblogbybrowsingto:
http://www.acunetix.com/blog/.

Request Support
Ifyouencounterpersistentproblemsthatyoucannotresolve,weencourageyoutocontact
theAcunetixSupportteamviaemailatsupport@acunetix.com.Pleaseincludeany
informationyouthinkisusefultohelpusdiagnoseyourissue,suchasinformationonthe
webtechnologiesbeingused,screenshotsshowingtheproblemetc.Pleaseincludealsothe
licensekeyinformationinthesupportemail.
Wewilldoourbesttoansweryourquerywithin24hoursorless,dependingonyourtime
zone.

Knowledge base / Support page


YoucanalsoexploretheAcunetixknowledgebaseandothersupportoptionsbybrowsingto:
http://www.acunetix.com/support/.

Acunetix Facebook page


JoinusonFacebookforthelatestproductandindustryupdates:
http://www.facebook.com/Acunetix.