The Authentication, Control and Connection Features of Web Application Scanners

The current information is based on the results of the *2011/2012/2014/2016* benchmarks (excpet for entries marked as updated or new )

Last updated: 18/09/2016
Sorted in an ascending order according to the scanner name .
Hint: hover over the marks and titles to get additional information on the various features.
Glossary
Unified List   Commercial Scanners   Free / Open Source Scanners


#
LogoVulnerability Scanner
Custom
Cookie
Custom
Header
B
A
S
I
C
D
I
G
E
S
T
N
T
L
M
N
T
L
M
v
2
K
E
R
B
E
R
O
S
F
O
R
M
PROXY
GZIP
DEFLATE
SSL
CERT
Logout
Detection
Exclude
Logout
Exclude
URL
Exclude
Param
1
Acunetix WVS Free Edition
2
aidSQL
3
Andiparos
4
arachni
5
crawlfish
6
Damn Small SQLi Scanner (DSSS)
7
Gamja
8
Grabber
9
Grendel Scan
10
IronWASP
#
LogoVulnerability Scanner
Custom
Cookie
Custom
Header
B
A
S
I
C
D
I
G
E
S
T
N
T
L
M
N
T
L
M
v
2
K
E
R
B
E
R
O
S
F
O
R
M
PROXY
GZIP
DEFLATE
SSL
CERT
Logout
Detection
Exclude
Logout
Exclude
URL
Exclude
Param
11
iScan
12
JSky Free Edition
13
LoverBoy
14
Mini MySqlat0r
15
Netsparker Community Edition
16
N-Stalker 2009 Free Edition
17
N-Stalker 2012 Free Edition
18
Oedipus
19
openAcunetix
20
Paros Proxy
#
LogoVulnerability Scanner
Custom
Cookie
Custom
Header
B
A
S
I
C
D
I
G
E
S
T
N
T
L
M
N
T
L
M
v
2
K
E
R
B
E
R
O
S
F
O
R
M
PROXY
GZIP
DEFLATE
SSL
CERT
Logout
Detection
Exclude
Logout
Exclude
URL
Exclude
Param
21
PowerFuzzer
22
Priamos
23
ProxyStrike
24
safe3wvs (limited free edition)
25
Sandcat Free Edition
26
Scrawlr
27
ScreamingCSS
28
Secubat
29
SkipFish
30
SQID (SQL Injection Digger)
#
LogoVulnerability Scanner
Custom
Cookie
Custom
Header
B
A
S
I
C
D
I
G
E
S
T
N
T
L
M
N
T
L
M
v
2
K
E
R
B
E
R
O
S
F
O
R
M
PROXY
GZIP
DEFLATE
SSL
CERT
Logout
Detection
Exclude
Logout
Exclude
URL
Exclude
Param
31
SQLiX
32
sqlmap
33
Syhunt Mini (Sandcat Mini)
34
Uber Web Security Scanner
35
Vega
36
VulnDetector
37
W3AF
38
Wapiti
39
WATOBO
40
Web Injection Scanner (WIS)
#
LogoVulnerability Scanner
Custom
Cookie
Custom
Header
B
A
S
I
C
D
I
G
E
S
T
N
T
L
M
N
T
L
M
v
2
K
E
R
B
E
R
O
S
F
O
R
M
PROXY
GZIP
DEFLATE
SSL
CERT
Logout
Detection
Exclude
Logout
Exclude
URL
Exclude
Param
41
WebCruiser Free Edition
42
WebScarab
43
WebSecurify (Opensource Version)
44
WSTool
45
Xcobra
46
XSSer
47
XSSploit
48
XSSS
49
ZAP


Statistics
#
Custom
Cookie
Custom
Header
B
A
S
I
C
D
I
G
E
S
T
N
T
L
M
N
T
L
M
v
2
K
E
R
B
E
R
O
S
F
O
R
M
PROXY
GZIP
DEFLATE
SSL
CERT
Logout
Detection
Exclude
Logout
Exclude
URL
Exclude
Param
Scanners:2716251518222030171329139222519



Glossary
AliasGeneral FeatureDescriptionReferences
Custom CookieHTTP Cookie/s CustomizationSupport for customizing the cookie/s used in the test
Custom HeaderHTTP Header/s CustomizationSupport for customizing the header/s used in the test
BASICBasic AuthenticationSupport for HTTP Basic Authentication1
DIGESTDigest AuthenticationSupport for HTTP Digest Authentication1
NTLMNTLM AuthenticationSupport for Authnetication via NTLM Credentials1
NTLMv2NTLMv2 AuthenticationSupport for Authenctication via NTLM Credentials1
KerberosKerberos AuthenticationSupport for Authenctication via Kerberos Protocol1
FORMFORM Based AuthenticationFORM Based Authentication Support (Html Forms)1
PROXYOutgoing Proxy SupportSupport for forwarding the communication via an Outgoing Proxy
GZIPGZIP Compression SupportSupport for decompressing/compressing GZIP communication1
DEFLATEDeflate Compression SupportSupport for decompressing/compressing Deflate communication1
SSLSSL/TLS Encryption SupportScan SSL/TLS Enhanced Servers1
CERTClient Side CertificateClient Side Certificate Authentication Support
Logout DetectionAutomated Logout DetectionSupport for automatically detecting invalid sessions (logout/timeout)
Logout ExclusionLogout URL ExclusionSupport for excluding the URL from the scan
URL ExclusionURL ExclusionSupport for excluding URL groups from the scan
Param ExclusionHTTP Parameter ExclusionSupport for excluding HTTP parameters from the scan



Copyright © 2010-2015 by Shay Chen. All rights reserved.
Click here to learn how this information may be published or reused.