Netsparker Community Edition – Web Application Security Scanner

Outsmart Malicious Hackers


Netsparker is a Web Application Security Scanner that claims to be False-Positive Free. The developers thought that if you need to investigate every single identified issue manually what’s the point of having an automated scanner? So they developed a new technology which can confirm vulnerabilities on demand which allowed us to develop the first false positive free web application security scanner.

When Netsparker identifies an SQL Injection, it can identify how to exploit it automatically and extract the version information from the application. When the version is successfully extracted Netsparker will report the issue as confirmed so that you can make sure that the issue is not a false-positive.

Same applies to other vulnerabilities such as XSS (Cross-site Scripting) where Netsparker loads the injection in an actual browser and observes the execution of JavaScript to confirm that the injection will actually get executed in the browser.

Thanks to its comprehensive and powerful JavaScript engine it’s possible to simulate a real attacker successfully. This means it can successfully analyse websites that rely on AJAX and JavaScript.

You don’t need to be a security expert, get training or read a long manual to start. Since the user interface is easy to use and can confirm and show you the impact, you can just fire it up and start using it.

Netsparker - Community Edition

You can download Netsparker – Community Edition here:

NetSparkerCommunityEditionSetup.exe

Or read more here.

Posted in: Countermeasures, Database Hacking, Security Software, Web Hacking

, , , , , , , ,


Latest Posts:


snallygaster - Scan For Secret Files On HTTP Servers snallygaster – Scan For Secret Files On HTTP Servers
snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn't be public and can pose a s
Portspoof - Spoof All Ports Open & Emulate Valid Services Portspoof – Spoof All Ports Open & Emulate Valid Services
The primary goal of the Portspoof program is to enhance your system security through a set of new camouflage techniques which spoof all ports open and also emulate valid services on every port.
Cambridge Analytica Facebook Data Scandal Cambridge Analytica Facebook Data Scandal
One of the biggest stories of the year so far has been the scandal surrounding Cambridge Analytica that came out after a Channel 4 expose that demonstrated the depths they are willing to go to profile voters, manipulate elections and much more.
GetAltName - Discover Sub-Domains From SSL Certificates GetAltName – Discover Sub-Domains From SSL Certificates
GetAltName it's a little script to discover sub-domains that can extract Subject Alt Names for SSL Certificates directly from HTTPS websites which can provide you with DNS names or virtual servers.
Memcrashed - Memcached DDoS Exploit Tool Memcrashed – Memcached DDoS Exploit Tool
Memcrashed is a Memcached DDoS exploit tool written in Python that allows you to send forged UDP packets to a list of Memcached servers obtained from Shodan.
QualysGuard - Vulnerability Management Tool QualysGuard – Vulnerability Management Tool
QualysGuard is a web-based vulnerability management tool provided by Qualys, Inc, which was the first company to deliver vulnerability management services as a SaaS-based web-service.


4 Responses to Netsparker Community Edition – Web Application Security Scanner

  1. Maximilian Corrientes April 19, 2010 at 11:36 pm #

    We’ve tested several scanners which claim to be “false positive” free.

    It would be great if someone could make an independent test of our result.

    http://labs.german-websecurity.com/en/blog/?p=12

    We made a testpage with a rewrite condition and we were stunned about the bad handling of false positives by the web security scanners.

  2. Ferruh Mavituna April 20, 2010 at 11:28 am #

    Maximilian,

    Thanks for pointing out this problem. Netsparker already has a URL Rewrite detection engine and it works on file extensions as well. However this particular case happens due to a bug.

    We fixed this problem in 1.3.7.32, will release it soon.

    Cheers,

  3. TheLightCosine April 23, 2010 at 6:12 pm #

    I was actually rather pleased with what I saw in the Community Edition. I’d love to see the Enterprise Edition at work to form a complete opinion, but I have written a little review over at my blog:

    http://cosine-security.blogspot.com/2010/04/netsparker-community-edition-review.html

    • Darknet April 23, 2010 at 7:18 pm #

      I’ll see if I can work something out regarding the Enterprise edition, Ferruh has been a long time reader here too :)