Resource icon

Cracked Acunetix Web Vulnerability Scanner 12.0 Cracked 12.0

No permission to download
  • We are making some changes. Notify us if you find any bug or error.
Acunetix Web Vulnerability Scanner - a program to detect vulnerabilities in web resources. To date, a sufficiently large number of sites has a number of vulnerabilities that can lead to site hacking, leakage of confidential information and other unpleasant consequences. Administrators of web resources should be aware of the existing "holes" in the protection and promptly correct them. This program is created for this purpose.

She conducts various tests to identify all possible security threats on sites, and then creates a report with detailed information about her work and instructions on how to fix the vulnerability. The program has many different pentest programs, scanning the resource architecture and most of the content, deep scanning of single-page applications, checking for SQL code injection and cross-site scripting, and sending and intercepting various HTTP / HTTPS requests and analyzing responses from the server. The program has a number of special checks for one of the most popular CMS - Wordpress: admin password security, resistance to brute force, plug-in check (over 1,200 known plug-ins are in the database), and also detection of disguised malware modules.

Thanks to the multithreaded mode and fast search robotAcunetix Web Vulnerability Scanner can process thousands of pages at a high enough rate without stopping. It also does an excellent job with javascript and HTML5 pages and handles one-page Ajax applications. And the built-in AcuSensor utility can analyze the executable code and detect all false positives, thereby allowing the administrator or developer to save time on problems. Acunetix Web Vulnerability Scanner automatically performs the following checks: [*] Cross site scripting (XSS) - inserting unauthorized scripts into a page and executed by the browser; [*] SQL injection (execution of SQL queries from the browser to gain unauthorized access to data); [*]

Analysis of the site according to the GHDB database (Google hacking database) - a list of typical requests used by hackers to obtain unauthorized access to web applications and sites.
[*] Scan AJAX and Web 2.0 for vulnerabilities.
[*] Port scanning and service discovery.
[*] Analysis and construction of the site structure.
[*] Code execution;
[*] Directory traversal;
[*] File insertion (File inclusion);
[*] Disclosure of the source text of the script;
[*] CRLF injection;
[*] Cross-frame scripting;
[*] Detection of public backup files and folders;
[*]Detection of files and folders containing important information;
[*] Detection of folders with a low level of protection, allowing you to create, modify or delete files.
First release
Last update
0.00 star(s) 0 ratings