- Joined
- Jan 8, 2019
- Messages
- 56,623
- Solutions
- 2
- Reputation
- 32
- Reaction score
- 100,456
- Points
- 2,313
- Credits
- 32,750
6 Years of Service
76%

Invicti Professional Edition
Invicti Professional Web Application Security Scanner
Automatic, deadly accurate, and easy-to-use web application security scanner to automatically find security flaws in your websites, web applications, and web services.
Audit the Security of Your Websites with Invicti Web Application Security Scanner
Invicti finds and reports web application vulnerabilities such as SQL Injection and Cross-site Scripting (XSS) on all types of web applications, regardless of the platform and technology they are built with. Invicti’s unique and dead accurate Proof-Based Scanning Technology does not just report vulnerabilities, it also produces a Proof of Concept to confirm they are not false positives. Freeing you from having to double-check the identified vulnerabilities.
Some of the basic security tests should include testing:
SQL Injection
XSS (Cross-site Scripting)
DOM XSS
Command Injection
Blind Command Injection
Local File Inclusions & Arbitrary File Reading
Remote File Inclusions
Remote Code Injection / Evaluation
CRLF / HTTP Header Injection / Response Splitting
Open Redirection
Frame Injection
Database User with Admin Privileges
Vulnerability – Database (Inferred vulnerabilities)
ViewState not Signed
ViewState not Encrypted
Web Backdoors
TRACE / TRACK Method Support Enabled
Disabled XSS Protection
ASP.NET Debugging Enabled
ASP.NET Trace Enabled
Accessible Backup Files
Accessible Apache Server-Status and Apache Server-Info pages
Accessible Hidden Resources
Vulnerable Crossdomain.xml File
Vulnerable Robots.txt File
Vulnerable Google Sitemap
Application Source Code Disclosure
Silverlight Client Access Policy File Vulnerable
CVS, GIT, and SVN Information and Source Code Disclosure
PHPInfo() Pages Accessible and PHPInfo() Disclosure in other Pages
Sensitive Files Accessible
Redirect Response BODY Is Too Large
Redirect Response BODY Has Two Responses
Insecure Authentication Scheme Used Over HTTP
Password Transmitted over HTTP
Password Form Served over HTTP
Authentication Obtained by Brute Forcing
Basic Authentication Obtained over HTTP
Weak Credentials
E-mail Address Disclosure
Internal IP Disclosure
Directory Listing
Version Disclosure
Internal Path Disclosure
Access Denied Resources
MS Office Information Disclosure
AutoComplete Enabled
MySQL Username Disclosure
Default Page Security
Cookies not marked as Secure
Cookies not marked as HTTPOnly
Stack Trace Disclosure
Programming Error Message Disclosure
Database Error Message Disclosure
Code:
https://www.invicti.com
To see this hidden content, you must like this content.