Netsparker's Web Application Security Blog

Create Own Scan Policies with Netsparker Scan Policy Editor

Category: Product Docs & FAQS - Last Updated: Tue, 23 May 2017 - by Onur Yilmaz

In Netsparker version 3 we introduced the Scan Policy Editor. The Scan Policy Editor allows Netsparker users to create new scan policies in which they can specify which web application vulnerability checks should be included in a web security scan. Read this blog post for more information on the Scan Policy Editor and how you can use it to create your own scan policies and launch more efficient web application security scans. Read More

A Detailed Look into the New Features and Improvements of Netsparker Version 3.0

Category: Releases - Last Updated: Thu, 26 Oct 2017 - by Onur Yilmaz

Netsparker Version 3 - By far way better than its predecessors, Netsparker Web Application Security Scanner version 3 makes web application security an easy task and allows web application security experts automate more than ever before. Generate PCI Compliance reports with Netsparker 3.0 to verify your web applications are PCI complaint. Read this blog post for more details of what is new and improved in Netsparker version 3.0. Read More

An XSS Vulnerability is Worth up to $10,000 According to Google

Category: Web Security Readings - Last Updated: Thu, 13 Jun 2013 - by Robert Abela

Google are willing to pay up to $10,000 to anyone who discovers a cross-site scripting vulnerability in one of their web applications. Why are Google doing so? Definitely not by coincidence. By exploiting a cross-site scripting vulnerability a malicious hacker can easily gain administrative access on a web application, gain control over it and where possible infiltrate deeper into the corporate network. Read this blog post for more information about the impact an exploited XSS can have on your business. Read More

Use Netsparker to Detect Ruby on Rails Vulnerabilities

Category: News - Last Updated: Tue, 11 Jun 2013 - by Robert Abela

Netsparker can detect vulnerabilities in Ruby and Rails web applications. In this blog post we explain how a Ruby on Rails Remote Code Execution Vulnerability is exploited in the wild and how you can check if your web applications are vulnerable to such vulnerability with Netsparker. Read More

The Dangerous Complexity of Web Application Security

Category: Web Security Readings - Last Updated: Mon, 22 May 2017 - by Robert Abela

Modern web applications are becoming so complex that it is virtually impossible to check every possible attack vector and ensure it is not vulnerable without using an automated tool, such as Netsparker Web Application Security Scanner. The same applies for the modern trend of web application vulnerabilities, some of them can only be reproduced using automated means. Hence why the more complex a web application is, the bigger the need to use an automated web vulnerability scanner to identify vulnerabilities before malicious hackers do. Read More

False Negatives in Web Application Security

Category: Web Security Readings - Last Updated: Mon, 22 May 2017 - by Robert Abela

What are false negatives and what cases automated web application security scanners to not detect a vulnerability? In this web application security blog post Robert Abela explains what false negatives are and what to look for when searching for an automated web vulnerability scanner to ensure that it detects all vulnerabilities and leaves no false negatives behind for malicious attackers to exploit. Read More

South African Police Web Application for Whistleblowers Hacked via SQL Injection

Category: News - Last Updated: Tue, 28 May 2013 - by Robert Abela

The repercussions an exploited web application vulnerability such as an SQL Injection can have are a lot. For example in this particular case, by exploiting an SQL injection vulnerability malicious hackers published a list of whistleblowers in South Africa, endangering their lives. This example highlights the importance of identifying each and every web application vulnerability, since a malicious hacker only needs to exploit one. Full details about the attack in this blog post. Read More

Web Application Security Misconception; Are All Vulnerabilities Equally Dangerous?

Category: Web Security Readings - Last Updated: Mon, 22 May 2017 - by Robert Abela

In this web application security blog post, Robert Abela talks about a common misconception in the web security industry; are all vulnerabilities equally dangerous? Abela explains and answers this common misconception using an example with two of the most popular web application vulnerabilities typically listed in OWASP Top 10; Cross-site scripting (XSS) and SQL Injection. Read More

The Problem of False Positives in Web Application Security and How to Tackle Them

Category: Web Security Readings - Last Updated: Mon, 22 May 2017 - by Robert Abela

This web application security blog post explains what are False Positives in web application security and what negative impact they have on web security experts. It also explains why common automated web security tools generate false positives and how Netsparker Web Application Security Scanner does not report any false positives at all. Read More

Businesses Need Automated Web Application Security Scanners to Detect Web Vulnerabilities

Category: Web Security Readings - Last Updated: Mon, 22 May 2017 - by Robert Abela

This web application security articles highlights the reasons why businesses should use automated web application security scanners such as Netsparker to identify all vulnerabilities in their web applications. Automated web application security scanners can identify vulnerabilities from the OWASP Top 10 and much more, which are typically exploited by malicious hackers. Read More

Are Hackers a Step Ahead? An Analysis using Web Application Vulnerabilities

Category: Web Security Readings - Last Updated: Wed, 13 Sep 2017 - by Robert Abela

In this analysis the Netsparker team used Netsparker Web Application Security Scanner to scan a number of popular open source web applications and identify vulnerabilities in them. The results are very shocking and explain why malicious hackers are always a step ahead of website owners. A vulnerability statistics infographic was also generated from the results. Read More

5 Lessons We Have learnt from Netsparker Software Releases

Category: News - Last Updated: Thu, 02 Feb 2012 - by Ferruh Mavituna

In this blog post, Ferruh Mavituna explains what he and his team has learnt from the releases of Netsparker Web Application Security Scanner. Ferruh shares his experience of how everything is done, how the team works and how every decision, even a small one might affect the whole release cycle of Netsparker. Read More

How Netsparker ensures False Positives Free Web Vulnerability Scans

Category: Web Security Readings - Last Updated: Mon, 22 May 2017 - by Ferruh Mavituna

This web application security blog post explains why false positives are one of the biggest problem of today's commercial web application vulnerability scanners and also explains what the Netsparker team is doing to ensure that Netsparker Web Application Security Scanner does not report false positives when doing a web application security scan. Read More

XSS to Root in Apache Jira Incident

Category: Web Security Readings - Last Updated: Mon, 22 May 2017 - by Onur Yilmaz

In this blog post we explain how malicious hackers hacked into the Apache Foundation web servers and gained root access. They started by exploiting a cross-site scripting vulnerability in a web application called Jira. We scanned Jira with Netsparker and detected all of the vulnerabilities the malicious hackers exploited and more. This incident should serve as an example to all corporations to use Netsparker Web Application Security Scanner to identify and close down web application vulnerabilities. Read More

WebRaider

Category: Web Security Readings - Last Updated: Sat, 27 Feb 2010 - by Ferruh Mavituna

WebRaider is a proof of concept tool to get reverse shell from an SQL Injection with one request, without using any extra channels such as TFTP or FTP to upload the initial payload. Read More