{"id":47606,"date":"2022-09-26T15:23:39","date_gmt":"2022-09-26T13:23:39","guid":{"rendered":"https:\/\/cyberant.com\/wat-is-web-applicatie-scanning\/"},"modified":"2023-10-31T20:16:59","modified_gmt":"2023-10-31T19:16:59","slug":"what-is-web-application-scanning","status":"publish","type":"post","link":"https:\/\/cyberant.com\/en\/what-is-web-application-scanning\/","title":{"rendered":"What is web application scanning?"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l8isrpne-355b771d3c0d2fca3ca6c2740886f090\">\n#top .av_textblock_section.av-l8isrpne-355b771d3c0d2fca3ca6c2740886f090 .avia_textblock{\nfont-size:40px;\n}\n<\/style>\n<section  class='av_textblock_section av-l8isrpne-355b771d3c0d2fca3ca6c2740886f090 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 class=\"h2 entry-title\">What is web application scanning?<\/h1>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_hr-8ddc7023771561a08c2d1878cbb01bdc\">\n#top .hr.hr-invisible.av-av_hr-8ddc7023771561a08c2d1878cbb01bdc{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-av_hr-8ddc7023771561a08c2d1878cbb01bdc hr-invisible  avia-builder-el-1  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l8isvuwk-921adeafa6e34b36f12cae87d5012411\">\n#top .av_textblock_section.av-l8isvuwk-921adeafa6e34b36f12cae87d5012411 .avia_textblock{\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-l8isvuwk-921adeafa6e34b36f12cae87d5012411 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p id=\"tw-target-text\" class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">According to studies, more than 70% of all websites contain vulnerabilities that can lead to data breaches. Today we see that the possibilities of hackers continue to increase, hackers can now scan the entire internet in a short time. Organizations are often unaware of the leaks in their websites, or rely entirely on incomplete solutions such as Web Application Firewalls (WAF).<\/span><\/p>\n<h3>How a hacker works<\/h3>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">A hacker uses vulnerabilities to break in. He can try to discover these for himself, but many vulnerabilities are already known. These days, hackers often work the other way around: they don\u2019t look for vulnerabilities on your website, but they look for websites that contain a particular vulnerability. There are search engines for hackers that can show all websites with a certain vulnerability. For example, a hacker only has to select which website he wants to break into.<\/span><\/p>\n<h3>Testing common technology<\/h3>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">CyberAnt is able to investigate common frameworks and content management systems including the associated plugins for known leaks. But also web applications, such as management pages of printers, or internal company pages can be examined. Almost all known software leaks can be traced with the help of our services.<\/span><\/p>\n<h3>An audit on your website<\/h3>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">Often companies look no further than the green lock on their website. While you think your website is safe, it can happen that your website is not properly configured. Misconfiguration can result in hackers still being able to decrypt your website traffic, thereby decrypting sensitive data and passwords.<\/span><\/p>\n<h3>Scan for the OWASP top 10<\/h3>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">The OWASP top 10 is a list of the most common vulnerabilities that can occur in websites. CyberAnt is able to discover all these vulnerabilities. More information about the OWASP top 10 can be found in our knowledge base article:\u00a0<a href=\"https:\/\/cyberantcom.wpengine.com\/knowledge_base-item\/owasp-top-10\/\" target=\"_blank\" rel=\"noopener\">OWASP top 10.<\/a><\/span><\/p>\n<div class=\"text-center\">\n<div class=\"post-thumbnail\"><picture><source srcset=\"https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-1024x733.jpg.webp 1024w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-300x215.jpg.webp 300w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-768x550.jpg.webp 768w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-1536x1099.jpg.webp 1536w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-413x296.jpg.webp 413w, https:\/\/cyberant.com\/wp-content\/webp-express\/webp-images\/doc-root\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920.jpg.webp 1920w\" type=\"image\/webp\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><img decoding=\"async\" class=\"attachment-large size-large wp-post-image webpexpress-processed\" src=\"https:\/\/cyberant.com\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-1024x733.jpg\" sizes=\"(max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/cyberant.com\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-1024x733.jpg 1024w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-300x215.jpg 300w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-768x550.jpg 768w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-1536x1099.jpg 1536w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920-413x296.jpg 413w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/11\/laptop-2838918_1920.jpg 1920w\" alt=\"website security\" width=\"640\" height=\"458\" \/><\/picture><\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":934,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[216,180,181],"tags":[182,183,184,185,186,187,188,189],"class_list":["post-47606","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledge-base","category-product-information","category-risk-management","tag-cyber-security-en","tag-cyberaanval-en","tag-cyberrisk-en","tag-hacker-en","tag-it-infrastructuur-beschermen-en","tag-netcaptain-en","tag-vulnerability-management-en","tag-web-applicatie-scanning-en"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/posts\/47606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=47606"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/posts\/47606\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media\/934"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=47606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/categories?post=47606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/tags?post=47606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}