Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

Pen Testing

Get a demo
Gartner Peer Insights Reviews

Take Web Security Further with Pen-Testing Tools and WAF Integration

Acunetix works with advanced tools for penetration testers to take web security testing further. You can seed Acunetix scans using external tools as well as automatically export scan results to other tools to fully protect your web applications.
HTTP Editor

Take Automated Scanning Further

Most penetration testing professionals prefer to work with a whole scope of automatic and manual tools, not just a vulnerability scanner. Acunetix lets veteran testers as well as up-and-coming security researchers perform manual tests and then use the results of these tests to seed Acunetix scans. You can import data from the following security testing proxies:
    • Telerik Fiddler
    • PortSwigger BurpSuite
    • Postman
Automatic Web Application Firewall (WAF) configuration

Automatic Web Application Firewall Configuration

Acunetix integrates with popular Web Application Firewalls (WAFs) to automatically create appropriate WAF rules. These rules protect web applications against attacks that target vulnerabilities found by the scanner. This allows you to temporarily prevent exploitation of high-severity vulnerabilities until you are able to fix them. Acunetix integrates with:
  • Imperva SecureSphere
  • F5 BIG-IP Application Security Manager
  • FortiWeb WAF
  • Citrix Web Application Firewall
WAF Auto-configuration and Itegration/Extensibility Features

Integration and Extensibility

Acunetix features a powerful RESTful Application Programming Interface (REST API). The REST API allows you to access and manage scan targets, scans, vulnerabilities, reports, and other resources within Acunetix in a simple, programmatic manner using conventional HTTP requests.
  • Intuitive and powerful API endpoints
  • Easily retrieve results and execute actions
  • Seamlessly integrate Acunetix into complex, custom workflows and processes

Frequently asked questions

What tools do pen testers use?

Penetration testers (pen testers) use a lot of automatic and manual tools. They use a vulnerability scanner to perform initial analysis and find typical vulnerabilities. Then, they perform manual penetration testing using tools such as Metasploit, W3AF, and many more. Tools are selected according to specific needs at the time.

Read about Acunetix as penetration testing software.

What is better: pen testing or vulnerability scanning?

Both penetration testing and vulnerability scanning are important. Vulnerability scanning should be performed first to save time that would be needed for manual penetration testing. Then, you should perform manual penetration tests for vulnerabilities such as business logic issues (that cannot be found using any automated tools).

Read about the relationship between penetration testing and vulnerability scanning.

How does Acunetix work with pen testing tools?

The Acunetix web vulnerability scanner is a pen testing tool in itself: an automated penetration testing tool. However, Acunetix can also work with manual penetration testing tools by importing data directly from them.

Learn how to use import files with Acunetix.

How do I use Acunetix for pen testing?

The best way to use the Acunetix web vulnerability scanner as part of penetration testing is to start with an Acunetix scan. The Acunetix scan will give you a structure of the web application and find typical vulnerabilities. You can then use the structure of the web site to dig deeper manually if needed.

Read more about how to use Acunetix for penetration testing.

Recommended reading

Learn more about prominent vulnerabilities, keep up with recent product updates, and catch the latest news from Acunetix.

Knowledge Sharing

Knowledge Sharing

What is SQL Injection

What is Cross-site Scripting

What Are XML External Entity Attacks

What is Insecure Deserialization

Popular Posts

Popular Posts

SQL Injection Example

Preventing SQL Injection in PHP

TLS/SSL Cipher Hardening

Defending Against CSRF Attacks

In The News

In The News

2020 Web Application Vulnerability Report

Complimentary licenses – COVID-19

Interview with Acunetix President & COO

Innovations in Acunetix v13

Client: Xerox

“We use Acunetix as part of our Security in the SDLC and to test code in DEV and SIT before being promoted to Production.”

Kurt Zanzi, Xerox CA-MMIS Information Securtiy Office, Xerox
Read more case studies >

Take action and discover your vulnerabilities

Get a demo
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2024, by Invicti