Skip to main content

A Comparative Study of Vulnerabilities Scanners for Web Applications: Nexpose vs Acunetix

  • Conference paper
  • First Online:
International Conference on Advanced Intelligent Systems for Sustainable Development (AI2SD 2022)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 712))

  • 245 Accesses

Abstract

As known, everyone uses web applications to make purchases, transfer funds, upload data, etc. Meanwhile, the security of these web applications has become a significant challenge due to various vulnerabilities in web applications such as XSS, SQL injection (Second order), and many others. For this aim, we have penetration tests, that plays a very important role to detect those vulnerabilities, and it is called a simulated network attack, in which professional ethical hackers break into the company’s network to find vulnerabilities using tools that have been proven to uncover different types of vulnerabilities in a very short time. In recent years, cybersecurity has experienced a different kind of vulnerability detection based on AI, more specifically machine learning. This challenge has led cyber defense engineers to create different modules to handle this. In this article, we will do a comparison between two penetration testing tools while scanning the same target and discovering 3 ranking vulnerabilities and see some approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The Open Web Application Security Project.

  2. 2.

    Database Management System.

References

  1. Alzahrani, A., Alqazzaz, A., Fu, H., Almashf, N.: Web application security tools analysis. IEEE (2017)

    Google Scholar 

  2. Priyanka, A.K., Smruthi, S.S., Siddhartha, V.R., Engineering College India: WebApplication vulnerabilities: exploitation and prevention. IEEE (2020)

    Google Scholar 

  3. Nirmal, K., Janet, B., Kumar, R.: Web application vulnerabilities - the hacker’s treasure. In: Proceedings of the International Conference on Inventive Research in Computing Applications (ICIRCA) (2018). IEEE Xplore Compliant Part Number: CFP18N67-ART, ISBN: 978-1-5386-2456-2

    Google Scholar 

  4. Huang, H.C., Zhang, Z.K., Cheng, H.W., Shieh, S.W.: Web application security: threats, countermeasures, and pitfalls. IEEE (2017)

    Google Scholar 

  5. Moore, M.: Penetration testing and metasploit (2017)

    Google Scholar 

  6. Wang, Y., Yang, J.: Ethical hacking and network defense: choose your best network vulnerability scanning tool. In: Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops (2017)

    Google Scholar 

  7. Gupta, M.K. , Govil, M.C., Singh, G.: Predicting cross-site scripting (XSS) security vulnerabilities in web applications. In: Proceedings of the 12th International Joint Conference on Computer Science and Software Engineering (JCSSE) (2015)

    Google Scholar 

  8. D’silva, K., Vanajakshi, J., Manjunath, K.N., Prabhu, S.: An effective method for preventing SQL injection attack and session hijacking. In: Proceedings of the 2017 2nd IEEE International Conference on Recent Trends in Electronics Information and Communication Technology (RTEICT), India, 19–20 May 2017

    Google Scholar 

  9. Ping, C.: A second-order SQL injection detection method. IEEE (2017). 978-1-5090-64144/17/31.00

    Google Scholar 

  10. Parimala, G., Sangeetha, M., AndalPriyadharsini, R.: Efficient web vulnerability detection tool for sleeping giant-cross site request forgery. In: Proceedings of the 2018 National Conference on Mathematical Techniques and Its Applications (NCMTA) (2018)

    Google Scholar 

  11. Nagpure, S., Kurkure, S.: Vulnerability assessment and penetration testing of web application. In: Proceedings of the 2017 Third International Conference on Computing, Communication, Control and Automation (ICCUBEA) (2017)

    Google Scholar 

  12. Sagar, D., Kukreja, S., Brahma, J., Tyagi, S., Jain, P.: Studying open source vulnerability scanners for vulnerabilities in web applications. IIOAB J. (2018). iioab.org

    Google Scholar 

  13. Holik, F., Neradova, S.: Vulnerabilities of modern web applications. In: MIPRO 2017, Opatija, Croatia, 22–26 May 2017

    Google Scholar 

  14. Hasan, A.M., Divyakant, T., Meva, A.K., Roy, J.D.: Perusal of web application security approach. In: International Conference on Intelligent Communication and Computational Techniques (ICCT) Manipal University Jaipur, 22–23 December 2017

    Google Scholar 

  15. Utaya Surian, R., Rahman, N.A.A., Nathan, Y.: Scanner: vulnerabilities detection tool for web application. J. Phys. Conf. Ser. (2020)

    Google Scholar 

  16. Nexpose: Administration guide, product version 6.4. https://www.rapid7.com/products/nexpose/. Accessed 02 Mar 2022

  17. Sectools.org: Top 125 network security tools (2015). http://sectools.org/. Accessed Jan 2015

  18. Goela, J.N., Mehtreb, B.M.: Vulnerability assessment & penetration testing as a cyber defence technology. In Proceedings of the 3rd International Conference on Recent Trends in Computing (ICRTC 2015) (2015)

    Google Scholar 

  19. Joshi, C., Singh, U.K.: Analysis of vulnerability scanners in quest of current information security landscape. Int. J. Comput. Appl. (IJCA) 146(2), 1–7 (2016). 0975-8887

    Google Scholar 

  20. Joshi, C., Singh, U.K.: Performance evaluation of web application security scanners for more effective defense. Int. J. Sci. Res. Publ. (IJSRP) 6(6), 660–667 (2016). ISSN 2250-3153

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bochra Labiad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Labiad, B., Tanana, M., Laaychi, A., Lyhyaoui, A. (2023). A Comparative Study of Vulnerabilities Scanners for Web Applications: Nexpose vs Acunetix. In: Kacprzyk, J., Ezziyyani, M., Balas, V.E. (eds) International Conference on Advanced Intelligent Systems for Sustainable Development. AI2SD 2022. Lecture Notes in Networks and Systems, vol 712. Springer, Cham. https://doi.org/10.1007/978-3-031-35251-5_10

Download citation

Publish with us

Policies and ethics