Netsparker Community Edition – Web Application Security Scanner


Netsparker is a Web Application Security Scanner that claims to be False-Positive Free. The developers thought that if you need to investigate every single identified issue manually what’s the point of having an automated scanner? So they developed a new technology which can confirm vulnerabilities on demand which allowed us to develop the first false positive free web application security scanner.

When Netsparker identifies an SQL Injection, it can identify how to exploit it automatically and extract the version information from the application. When the version is successfully extracted Netsparker will report the issue as confirmed so that you can make sure that the issue is not a false-positive.

Same applies to other vulnerabilities such as XSS (Cross-site Scripting) where Netsparker loads the injection in an actual browser and observes the execution of JavaScript to confirm that the injection will actually get executed in the browser.

Thanks to its comprehensive and powerful JavaScript engine it’s possible to simulate a real attacker successfully. This means it can successfully analyse websites that rely on AJAX and JavaScript.

You don’t need to be a security expert, get training or read a long manual to start. Since the user interface is easy to use and can confirm and show you the impact, you can just fire it up and start using it.

Netsparker - Community Edition

You can download Netsparker – Community Edition here:

NetSparkerCommunityEditionSetup.exe

Or read more here.

Posted in: Countermeasures, Database Hacking, Security Software, Web Hacking

, , , , , , , ,


Latest Posts:


Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.
GitLab Watchman - Audit Gitlab For Sensitive Data & Credentials GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an app that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally, this includes code, commits, wikis etc


4 Responses to Netsparker Community Edition – Web Application Security Scanner

  1. Maximilian Corrientes April 19, 2010 at 11:36 pm #

    We’ve tested several scanners which claim to be “false positive” free.

    It would be great if someone could make an independent test of our result.

    http://labs.german-websecurity.com/en/blog/?p=12

    We made a testpage with a rewrite condition and we were stunned about the bad handling of false positives by the web security scanners.

  2. Ferruh Mavituna April 20, 2010 at 11:28 am #

    Maximilian,

    Thanks for pointing out this problem. Netsparker already has a URL Rewrite detection engine and it works on file extensions as well. However this particular case happens due to a bug.

    We fixed this problem in 1.3.7.32, will release it soon.

    Cheers,

  3. TheLightCosine April 23, 2010 at 6:12 pm #

    I was actually rather pleased with what I saw in the Community Edition. I’d love to see the Enterprise Edition at work to form a complete opinion, but I have written a little review over at my blog:

    http://cosine-security.blogspot.com/2010/04/netsparker-community-edition-review.html

    • Darknet April 23, 2010 at 7:18 pm #

      I’ll see if I can work something out regarding the Enterprise edition, Ferruh has been a long time reader here too :)