Acunetix Web Vulnerability Scanner Version 3.0 Combats Rise in “Google Hacking” Attacks

Seattle, Washington – November 21, 2005 – Acunetix, a leading security software company focused exclusively on helping enterprises secure their web applications and web sites, today announced the next-generation version of  Acunetix Web Vulnerability Scanner, which provides a comprehensive solution to detecting system vulnerabilities that are frequently exploited by hackers.

Acunetix Web Vulnerability Scanner provides a complete solution by automatically auditing website security. The software crawls an entire website, launches popular web attacks (SQL Injection, Cross Site scripting, Google hacking, etc.) and identifies vulnerabilities that need to be fixed.

The Achilles Heel in Enterprise Security Strategies: Web Applications

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

Increasingly, hackers are concentrating their efforts on web-based applications – shopping carts, forms, login pages, and dynamic content. A Gartner Group study determined that 75% of cyber attacks are done at the web application level. Web applications are accessible 24 hours a day, 7 days a week and are a passageway to valuable data: customer and employee databases, transaction information and proprietary corporate data. Many enterprises have addressed network security issues and have implemented firewall technology but have not yet protected their “crown jewels” – data that can be compromised via web application hacks.

The first reported instance of a Web application attack was perpetrated in 2000. While making online transactions with a large bank, a 17 year-old Norwegian boy noticed that the URLs of the pages he was viewing displayed his account number as one of the parameters. He substituted his account number with the account numbers of random bank customers and immediately gained access to customer accounts and personal details. Myriad other hackers have followed in his footsteps, exploiting hundreds of different techniques to compromise web applications and exploit what is fast becoming the biggest Achilles heel in an organization’s security strategy.

“Web applications are now the prime target for hackers. A quick hack of a vulnerable web application can give instant access to valuable data such as customer credit cards and employee social security numbers” said Nick Galea, CEO of Acunetix. “New hacking techniques emerge every day. Auditing one’s web applications should be the number one security concern for every enterprise.”

Version 3.0 of Acunetix Web Vulnerability Scanner Protects Against Google Hacking and Other New Threats

With this newest release of Acunetix Web Vulnerability Scanner, security administrators have access to a host of new features that will protect their web applications and web sites.

Prevention of Google Hacking

Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a hacker database of queries that can identify sensitive data. Although Google blocks some of the better known Google hacking queries, nothing stops a hacker from crawling sites and launching the Google Hacking Database queries directly onto the crawled content.

Version 3.0 of Acunetix Web Vulnerability Scanner launches all the queries found in the Google hacking database onto the crawled content of enterprise websites thus finding any sensitive data or exploitable targets before a “search engine hacker” does. Acunetix is first to market with a solution that detects Google hacking vulnerabilities.

Other New Features

Over forty new features and enhancements have been introduced in the latest release of Acunetix Web Vulnerability Scanner. Enhancements include sophisticated testing for buffer overflows & input validation, automatic detection of custom error pages, enhanced abilities to scan websites which are password protected, automatic HTML form fillers, the ability to crawl Macromedia Flash files, and numerous other new features. A complete description of enhancements is available:

Pricing & Availability

Acunetix WVS is available as an enterprise or as a consultant version. A subscription based license can be purchased for as little as $1,495, whereas a perpetual license starts at $2,995. For more information visit:

Acunetix is available through its network of partners. Partner inquiries from value added resellers are welcome. For more information, visit

About Acunetix

Acunetix was founded to combat the alarming rise in web attacks. Its flagship product, Acunetix Web Vulnerability Scanner, is the result of several years of development by a team of highly experienced security developers. Acunetix is a privately held company with headquarters based in Europe (Malta) with its New York US office scheduled to open in Q3 of 2005. For more information about Acunetix visit:

All product and company names herein may be trademarks of their respective owners. For more information:

Ken Gaebler | Walker Sands Communications

Email: [email protected]

Tel: (312) 267-0060, Fax: (312) 876-1388 Tamara BorgAcunetix Ltd – Malta

Email: [email protected]

Tel: (356) 231-68000; Fax: (356) 231-68001

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: