Your website security is essential to your online business. Having misconfiguration or not properly hardened your web/application servers can put your web applications at risk. Thousands of websites get hacked every day and recent research by Invicti shows the top 3 most popular vulnerabilities are XSS, SQL Injection & File Inclusion. As a website owner or security administrator, you should explore all options to ensure your online business is secure from hackers to avoid business loss and reputation. In this article, I will explain how you could use the Invicti cloud to scan your website for security vulnerabilities so you can take action before someone else find it. Following abbreviations are used below: –

SQLI – SQL InjectionRXSS – Remote Cross-Site ScriptingXSS – Cross-Site ScriptingLFI – Local File InclusionRFI – Remote File InclusionCRLF – Carriage Return and Line Feed

Let’s get it started… Create either a TRIAL account or send an email to info@invicti.com if you are working on Open Source Project. Once your account is ready, log in with your credential to Invicti Cloud. You will get the beautiful dashboard to set up your web URL to start the scan

Click on Scans » New Scan at the left navigationEnter your website details and click no Save

You will need to verify the ownership to avoid the abuse. You may either verify using Email, File upload, HTML tag, or DNS record.

Choose the verification method you prefer and click on verifyOn next window, you will be given an option to configure the scan

Go through them and select the one you prefer.Important to select the scope whether you want to scan only entered URL or the whole domain.

Once you are done with the configuration, click on LaunchNext screen, you will see the scan progress.

Time to take a coffee 🙂 Meanwhile, you can check out some other FREE Online Security Vulnerability Scanner. Once the scan is started, an email with a link of will also notifies you “scan status view”. So don’t worry if you close the browser. You can always check your email and go to a status page.

The scan may take a few hours if you have selected to scan “Whole site” so keep patience. Once a scan is done, an email will notify you.Upon login, you will also see those details in the nice dashboard with severities, vulnerabilities for you to take action.

You can also export the report by following in XML, CSV, PDF, or HTML format.

Detailed Scan ReportVulnerabilities ListCrawled URLsScanned URLs

Here is how the executive summary looks like. Not good, I got to fix them shortly. How about you? Haven’t you done the scanning yet, go ahead and explore the vulnerabilities and fix them before bad guys find and make your website unavailable?

Detect Website Vulnerabilities   Security Flaws before Hackers Do - 84Detect Website Vulnerabilities   Security Flaws before Hackers Do - 31Detect Website Vulnerabilities   Security Flaws before Hackers Do - 21Detect Website Vulnerabilities   Security Flaws before Hackers Do - 48Detect Website Vulnerabilities   Security Flaws before Hackers Do - 9Detect Website Vulnerabilities   Security Flaws before Hackers Do - 83Detect Website Vulnerabilities   Security Flaws before Hackers Do - 70Detect Website Vulnerabilities   Security Flaws before Hackers Do - 42Detect Website Vulnerabilities   Security Flaws before Hackers Do - 35Detect Website Vulnerabilities   Security Flaws before Hackers Do - 25Detect Website Vulnerabilities   Security Flaws before Hackers Do - 81Detect Website Vulnerabilities   Security Flaws before Hackers Do - 17Detect Website Vulnerabilities   Security Flaws before Hackers Do - 19Detect Website Vulnerabilities   Security Flaws before Hackers Do - 37Detect Website Vulnerabilities   Security Flaws before Hackers Do - 83Detect Website Vulnerabilities   Security Flaws before Hackers Do - 44Detect Website Vulnerabilities   Security Flaws before Hackers Do - 21Detect Website Vulnerabilities   Security Flaws before Hackers Do - 98Detect Website Vulnerabilities   Security Flaws before Hackers Do - 74Detect Website Vulnerabilities   Security Flaws before Hackers Do - 65Detect Website Vulnerabilities   Security Flaws before Hackers Do - 26Detect Website Vulnerabilities   Security Flaws before Hackers Do - 92Detect Website Vulnerabilities   Security Flaws before Hackers Do - 12Detect Website Vulnerabilities   Security Flaws before Hackers Do - 63Detect Website Vulnerabilities   Security Flaws before Hackers Do - 10Detect Website Vulnerabilities   Security Flaws before Hackers Do - 43Detect Website Vulnerabilities   Security Flaws before Hackers Do - 14Detect Website Vulnerabilities   Security Flaws before Hackers Do - 99Detect Website Vulnerabilities   Security Flaws before Hackers Do - 92Detect Website Vulnerabilities   Security Flaws before Hackers Do - 7Detect Website Vulnerabilities   Security Flaws before Hackers Do - 13Detect Website Vulnerabilities   Security Flaws before Hackers Do - 34Detect Website Vulnerabilities   Security Flaws before Hackers Do - 58Detect Website Vulnerabilities   Security Flaws before Hackers Do - 90