Can you be hacked? AISN’s Internal and External Vulnerability Scanning assesses your websites, networks and applications for weaknesses. Our Auditing and Remediation Services will enable you to assure comprehensive security and compliance.

Nearly three-quarters of websites have vulnerabilities that could lead to the theft of sensitive corporate data such as Personally Identifiable Information (PII), which resides in credit card information and customer lists. Hackers tend to focus their efforts on web-based applications such as shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide easy access to backend corporate databases and also allow hackers to perform illegal activities using the compromised site.

SCAN Your Websites

  • SQL Injection and Blind SQL Injection
  • Cross-site Scripting (XSS)
  • OWASP Top 10 and Other Vulnerabilities

GET Advanced Reporting

  • Security Issues Details
  • Suggested Fixes
  • Great for PCI/ HIPAA Compliance, SEC 501 Requirements

AISN Vulnerability Scanning Core Features

  • Guaranteed low false positives
  • Deep scanning of most content
  • Scanning for the latest and most complex AJAX/ Web 2.0 technologies
  • Testing on password protected areas and web forms with automatic form filler
  • Detailed reports that enable you to meet legal and regulatory compliance
  • Auto-configuration of web application firewall
  • Advanced network level scanning
  • WordPress vulnerability scanning
  • Advanced penetration testing tools
  • Advanced Features
  • Automatic Custom 404 Error Page & rewrite rule identification
  • HTTP Parameter Pollution (HPP) vulnerability detection
  • Supports custom HTTP headers in automated scans
  • Supports multiple HTTP authentication credentials
  • Support for CAPTCHA, Single Sign-On and Two Factor authentication mechanisms
  • Customize list of false positives and script custom web attacks
  • Automate File Upload Forms vulnerability testing
  • Locates CRLF injection, Code execution, Directory Traversal, File inclusion,
  • Google Hacking Database and Authentication vulnerabilities
  • Scanning profiles to scan websites with different scan options and identities
  • Compare scans and find differences with previous scans
  • Easily re-audit vulnerability fixes with rescan functionality

Firewalls, SSL and Locked-Down Servers Are Futile Against Web Application Hacking

Web application attacks, launched on port 80/443, go straight through the firewall, past the operating system and network level security, and right into the heart of your application and corporate data. Custom web applications are often insufficiently tested, have undiscovered vulnerabilities and are therefore easy prey for hackers. Find out if your website is secure before hackers download sensitive data, launch criminal activity from your website and endanger your business. AISN’s Vulnerability Scanning crawls your website, automatically analyzes your web applications and finds perilous SQL injection, cross-site scripting and other vulnerabilities that expose your online business.

Website analysis and vulnerability scanning offers:

  • Accurate scanning with low false positives, by combining black box scanning techniques with feedback from its sensors placed inside the source code
  • An automatic JavaScript analyzer for security testing of AJAX and Web 2.0 applications
  • Industry’s most advanced and in-depth SQL injection and Cross-Site Scripting testing
  • Login Sequence Recorder makes testing web forms and password protected areas easy
  • Multi-threaded and lightning fast scanner able to crawl hundreds of thousands of pages without interruptions
  • Deep scanning for complex web technologies such as SOAP, XML, AJAX and JSON.
  • In-depth checking for SQL Injection, Cross-Site Scripting (XSS) Vulnerabilities* and many others
  • SQL injection is a hacking technique which modifies SQL queries in order to gain access to data in the database

Network security scans check the perimeter servers, locating any vulnerabilities in the OS, server software, network services and protocols.

AISN’s network security scan uses the OpenVAS database of network vulnerabilities and scans for more than 35,000 network level vulnerabilities, including Shellshock, Heartbleed, and POODLE — vulnerabilities which continue to plague not only web servers but also a large percentage of other network servers.

Network security vulnerability scanning will:

  • Detect misconfigurations and vulnerabilities in OS, server applications, network services, and protocols
  • Assess security of detected devices (routers, hardware firewalls, switches and printers)
  • Scan for trojans, backdoors, rootkits, and other malware that can be detected remotely
  • Test for weak passwords on FTP, IMAP, SQL servers, POP3, Socks, SSH, Telnet
  • Check for DNS server vulnerabilities such as Open Zone Transfer, Open
  • Recursion and Cache Poisoning
  • Test FTP access such as anonymous access potential and a list of writable FTP directories
  • Check for badly configured Proxy Servers, weak SNMP Community Strings, weak SSL ciphers and many other security weaknesses
  • Deliver concise reporting identifying where security fixes are needed

Want to Inquire About Partnerships?