All Collections
Connectors
Older Release
Acunetix 360 Connector (previous revision)
Acunetix 360 Connector (previous revision)

Integrating Acuntix 360 into the Vulcan Platform

Updated over a week ago

Am I reading the right user guide?

Certain connectors have more than one user guide. It depends on the environment's setup and on the connector's available releases (new vs. older revisions).

To access the user guide that is relevant to your environment, simply click on the "How to connect" button located on the connector's setup page. By doing so, you will be directed to the user guide that aligns with your specific environment, ensuring relevancy and accuracy.

About integrating Acunetix 360 into the Vulcan Platform

Acunetix 360 is a DAST Web Application Security Testing scanner that audits your web applications by checking for vulnerabilities like SQL Injection, cross-site scripting, and other exploitable vulnerabilities. Acunetix 360 automatically creates a list of all your websites, applications, and APIs. In general, Acunetix 360 scans any website or web application that is accessible via a web browser and uses the HTTP/HTTPS protocol. When integrated with your Vulcan Platform, you'll be able to review web application vulnerabilities on your assets, while leveraging the power of Vulcan Cyber discoverability and automation.


Configure the Acunetix 360 connector

  1. First, you need to grant the Vulcan Platform access to your Acunetix 360 instance by issuing a user token. You authenticate to the Acunetix 360 API by providing a user ID and authentication token which you can find on Acunetix 360 your account page.

    For instructions on how to generate an API Token, see here.

  2. Log in to your Vulcan Cyber dashboard and go to Connectors.

  3. Click on Add a Connector.

  4. Click on the Acunetix 360 icon.

  5. Enter the following information into the connector setup page.

    • User ID and API Token - the ones you got in Step 1.

    • Map Acunetix severity to Vulcan numerical score: By default, the Vulcan Platform maps the Acunetix severity value with a set of default values. To customize the specific mapping values, click show more and modify.

  6. Click the Test Connectivity button to verify that Vulcan Cyber can connect to your Acunetix 360 instance, then click Create (or Save Changes).

  7. Allow some time for the sync to complete. You can review the sync status under Log.

  8. To confirm that the sync is complete, navigate to the Connectors tab to check the sync status. Once the Acunetix 360 icon shows Connected, the connection is complete.


From Acunetix 360 to the Vulcan Platform - Fields Mapping

Connector Fields Mapping

Acunetix 360 field

Vulcan field

Value Example

Name

Asset Name

"Name": "Vulcan Lab - VulnWeb"

Website

Asset Type

RootURL

Asset Pages - Name

"RootUrl": "http://www.vulnweb.com/"

-

Asset details

"Id": "c4a8ea58-4e8f-46d6-fe6c-ae03028ccf50",

"CreatedAt": "2021-12-19T11:53:02.5447089+00:00",

"UpdatedAt": "2021-12-19T12:16:54.4704355+00:00",

"Description": "Vulcan Lab - VulnWeb Website.",

"TechnicalContactEmail": "ilan@vulcan.io",

"Groups": [ { "Id": "e77f4779-0d15-4e32-e729-ae030215350d", "Name": "Default" } ],

"IsVerified": true,

"LicenseType": "Subscription",

"AgentMode": "Cloud",

Tags

Asset Tags

Description

Vulnerability title

"Description": "Content Security Policy (CSP) Not Implemented"

Severity

Vulnerability score

Summary

Vulnerability description

-

Vulnerability status

Click on a vulnerability > Fixes tab

Fix title

Click on a vulnerability > Fixes tab

Fix description

Click on a vulnerability > Fixes tab

Fix reference

Example of "Fix title", "Fix description", and "Fix reference" as retrieved from Acunetix 360:

Vulnerability Status Mapping

Acunetix status

Vulcan status

Vulnerable

Vulnerable

Fixed

Fixed

Ignored - false positive

False Positive

Ignored - risk acknowledged

Accepted Risk

Vulnerability Score Mapping

Connector Score

Vulcan score

Critical

10

High

7

Medium

5

Low

3

Best Practice

0

Information

0


Locating Acunetix 360 vulnerabilities in the Vulcan Platform

As Acunetix 360 discovers vulnerabilities, the Vulcan Platform connector imports those vulnerabilities for reporting and action. With a large number of assets and vulnerabilities, discovering specific vulnerabilities via source is made easy with filters.

  1. Open the Vulcan Platform dashboard and navigate to the Vulnerabilities. Click on the Search or filter vulnerabilities search box, scroll to the Vulnerability Source option, and click to filter by the vulnerability source.

  2. Locate Acunetix 360 on the vulnerability source list and click to filter results by Acunetix 360.

  3. Click on any vulnerability to view further information.


Locating Acunetix 360 assets in the Vulcan Platform

To quickly locate all synced website application assets from Acunetix 360, Go to the Assets tab in Vulcan Cyber.

  1. Open the Vulcan Cyber dashboard and navigate to Assets > Websites tab.

  2. Click on the Search or filter websites input box and select Connector from the drop-down selection.

  3. Locate the Acunetix 360 option to view all synced assets.


Automating Accunetix 360 vulnerability actions in the Vulcan Platform

Large environments quickly become unmanageable if constant manual attention and action are necessary to remediate vulnerabilities. Take advantage of the automation capabilities of Vulcan Cyber and the Acunetix 360 connector.

Here is an example of creating email automation (other automation types are also available):

  1. Open the Vulcan Cyber dashboard and navigate to the Automation section. Once there, click the Create new Playbook button.

  2. First, give your automation playbook an indicative name.

    EXAMPLE:

  3. Select Acunetix 360 for the source of vulnerabilities, and continue to set the vulnerability condition as Risk is Critical / High (for example), leaving the rest as defaults, or simply set the conditions as it suits your needs.
    EXAMPLE:

  4. Continue to the Remediation actions and select the take-action channel. In this example, we selected "Assign via email".

  5. Choose how the separation of tickets is handled. In this example, we selected the "up to 200 vulnerabilities are aggregated into a single email" option. Then add the recipient emails to be notified.

  6. Leave all other steps as default (or modify if needed) and click on Save and Run.


Did this answer your question?