To optimize penetration testing effectiveness, Netsparker incorporates a range of commonly used utility features and tools. When you need to investigate or visualize a troublesome web vulnerability, it is reassuring to know that all the security tools you need are at your fingertips.
Use the HTTP Request Builder to create your own HTTP requests or modify imported ones. The HTTP Request builder is a handy tool that you will certainly use during a manual vulnerability assessment, or when troubleshooting a particular problem, for example when trying to identify logical vulnerabilities.
To facilitate the use of Netsparker's manual override tools (for example, ability to add links manually and integrated exploitation), Netsparker also includes a text encoder and decoder that supports encoding of URL, HTML, Base64, UTF7, MD5, SHA1, SHA256, SHA512 and several other encoding schemes.
When security scanning ASP.NET and modern. NET web applications, Netsparker extracts ViewState data from its containing HTTP requests and responses and presents it via a user-accessible viewer for further troubleshooting.
When Netsparker identifies a web application security vulnerability, it also provides extensive supporting information such as recommended remedial action.
Having undertaken the recommended remedial action save time and be more efficient by using the retest individual vulnerability option in Netsparker rather than launching another complete web application security scan as required by several other security scanners.