Loading...

Website Vulnerability Scanner 20 Credits

Discover common web application vulnerabilities and server configuration issues

Sample Report

|

Use Cases

|

Technical Details

Sample Report

Here is a Website Vulnerability Scanner sample report:

  • The report starts with a quick summary of the findings and risk ratings
  • Each finding has a detailed explanation in terms of risk and recommendations
  • The vulnerabilities are ordered by the risk level

See also a sample pdf report.

Website Vulnerability Scanner - Use Cases

Finds common vulnerabilities which affect web applications: SQL injection, XSS, OS Comand Injection, Directory Traversal and others. The scanner also identifies specific web server configuration issues.

Website Penetration Testing

Speed-up your penetration test with this online scaner. It is already set-up and cofigured with the optimal settings for best results and performance. Just start the scan and come back later for results.

Self-Security Assessment

You can perform a self-security assessment in order to detect weaknesses in your own application. This will allow you to fix the vulnerabilities before being hit by real attackers.

Third-Party Website Audit

If you are a web development company, you can also show this report to your clients and prove that you have implemented the proper security measures in the application.

Technical Details


About

List of tests performed

Here is the complete list of tests performed by this vulnerability scanner:
Light Scan Full Scan Test performed
Fingerprint web server software
Analyze HTTP headers for security misconfiguration
Check the security of HTTP cookies
Check the SSL certificate of the server
Check to see whether the web server is at the latest version
Check if the server software is affected by known vulnerabilities
Analyze robots.txt for interesting URLs
Check whether a client access file exists, and if it contains a wildcard entry (clientaccesspolicy.xml, crossdomain.xml)
Discover server configuration problems such as Directory Listing
Check for sensitive files (archives, backups, certificates, key stores) based on hostname and some common words
Check for the presence of known scripts vulnerable to XSS, SQL injection, LFI, RFI and Command injection
Attempt to upload and delete a file through the PUT and DELETE HTTP methods
Test for the Bash Shellshock vulnerability
Find administrative pages
Attempt to find interesting files/functionality
Check for information disclosure issues
Identify which type of web application is running
Enumerate existing CGI directories
Attempt to enumerate users directly from the web server (/~user)
Check for web server XSS in Expect HTTP header
Check for multiple index files
Check the HTTP Options returned by the server

Warning: The Full Scan generates a high amount of noise in the network. Most correctly configured IDSs will detect this scan as attack traffic. Do not use it if you don't have proper authorization from the target website owner.


Parameters

Parameter Description
Target URL This is the url of the website that will be scanned. The tool does not follow any redirects so the exact url will be scanned. If you want to scan only a certain directory or path, you can add it in the url like: http://www.mycompany.com/base_directory/. All urls must start with http or https.
Light Scan This is a fast, passive and non-intrusive scan.
Full Scan This is a complete assessment which covers a much broader range of security tests.


How it works

The Light Scan is performed by a custom written security scanner which implements the tests described above. This scan is passive and non-intrusive, generating a maximum of 20 requests to the target application.

The Full Scan is performed by the well known Nikto Vulnerability Scanner which can detect specific web vulnerabilities on your target server.

Nikto implements multiple techniques for fingerprinting server software and for identifying server side vulnerabilities. It uses a signature database which is periodically updated and each signature contains a specific request that identifies an unique vulnerability.

Nikto sends a significant amount of HTTP requests to the target server in order to probe each signature from the database. However, it does not have such power to generate a denial of service effect.