Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

INTERACTIVE APPLICATION SECURITY TESTING WITH

AcuSensor Technology

Get a demo
Gartner Peer Insights Reviews

Interactive Application Security Testing (IAST) with AcuSensor

The AcuSensor technology is an additional component of Acunetix. When you install and use AcuSensor, Acunetix becomes an IAST solution (grey-box scanner), not just a DAST scanner (black-box scanner). AcuSensor works with applications written in Node.js, PHP, Java (including the Spring framework), and ASP.NET.

v13 acusensor narrow screenshot

What Are the Benefits of AcuSensor?

When you use AcuSensor, Acunetix gets additional information from the server back end, at the time when Acunetix is scanning the web application. This additional information introduces a number of improvements.

  • Ease of remediation: AcuSensor connects to the code interpreter or compiler (depending on the language) and it can identify the exact line of source code (for PHP) or point to a location in a stack trace (for Java and ASP.NET). With this information, your developers can fix vulnerabilities much faster.
  • Greater precision: AcuSensor can detect the following vulnerability types with 100% confidence: SQL Injection, code injection, CRLF injection, directory traversal, arbitrary file creation/deletion, email header injection, file upload, file inclusion, file tampering, PHP code injection, and PHP SuperGlobals overwrite.
  • Full coverage: AcuSensor provides a full directory listing of the web application, ensuring that the entire web application is scanned, including any hidden, unlinked locations. Additionally, AcuSensor can discover hidden GET and POST inputs, even if these are not used within the web application.
AcuSensor diagram

How Does AcuSensor Work?

The Acunetix scanner works by sending payloads and analyzing responses. When the web server receives the payload, it executes back-end code. If AcuSensor is installed, it analyzes the executed back-end code and provides the scanner with additional information.

  • You must install AcuSensor on the server for the selected language. AcuSensor is available for Linux/UNIX and Windows servers.
  • AcuSensor works directly with the PHP interpreter as well as Java and ASP.NET bytecode compilers.
  • You do not need to modify your source code at all to use AcuSensor. This is a major advantage over IAST offerings that require you to compile sensors within your code, often requiring you to change your build process or add software dependencies to your project.
v13 acusensor zoom screenshot

When to Use IAST?

AcuSensor works best in specific environments and is not recommended for some of the others. To get the best out of AcuSensor, use it in the right environment.

  • You should install AcuSensor on your staging servers. This is the best place to perform IAST analysis.
  • You may install AcuSensor on virtual machines to perform IAST analysis as part of CI/CD pipelines. In this case, the AcuSensor installation would need to be done as part of the CI/CD pipeline.
  • We do not recommend installing AcuSensor on production servers. An active AcuSensor consumes some resources, so your production web applications may run slower.
  • AcuSensor is currently available for Node.js, PHP, ASP.NET, and Java. Let us know if you would like us to create an AcuSensor for your technology.

Recommended Reading

Learn more about prominent vulnerabilities, keep up with recent product updates, and catch the latest news from Acunetix.

icon_knowledge

Knowledge Sharing

What is SQL Injection

What is Cross-site Scripting

What Are XML External Entity Attacks

What is Insecure Deserialization

icon_popular

Popular Posts

SQL Injection Example

Preventing SQL Injection in PHP

TLS/SSL Cipher Hardening

Defending Against CSRF Attacks

icon_news

In The News

Complimentary licenses – COVID-19

Interview with Acunetix President & COO

Innovations in Acunetix v13

Network scans now fully available

xerox

“We use Acunetix as part of our Security in the SDLC and to test code in DEV and SIT before being promoted to Production.”

Kurt Zanzi, Xerox CA-MMIS Information Securtiy Office, Xerox

Take action and discover your vulnerabilities

Get a demo
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2022, by Invicti