Main > Security & Privacy > Other Tools >

Maui Security Scanner 2.51.10


Maui Security Scanner 2.51.10

Sponsored Links

Maui Security Scanner 2.51.10 Ranking & Summary

RankingClick at the star to rank
Ranking Level
User Review: 0 (0 times)
File size: 8.44 MB
Platform: Windows 2K/XP/2003/Vista
License: Trial
Price: $299
Downloads: 548
Date added: 2007-05-27
Publisher: Elanize KG

Maui Security Scanner 2.51.10 description

Maui Security Scanner is an innovative security assessment software suite for todays sophisticated Web application environments..
Maui Security Scanner ensures the security of Web applications by identifying vulnerabilities such as Cross-Site Scripting (XSS) and SQL Injection accross a site.
Maui Security Scanner allows web administrators to perform aggressive and comprehensive scans of an organizations web server to isolate vulnerabilities and identify security holes.
By using Maui Security Scanner, web-site admins and IT-professionals can see whether their web site(s) are hackable or vulnerable to attacks.
Maui Security Scanner gives you the opportunity of auditing your web site(s) as they are audited by external hackers on your behalf.
This suite provides a fully featured web security scanner, crawler, report analysis tool, as well as web security explanations, and an extensive database of security checks for all leading web server platforms.
Instead of manually searching for security defects, which is very hard, web-site admins and IT-professionals trust Maui Security Scanner to detect security defects and vulnerabilities automatically.
Maui Security Scanner is very configurable and can be used to automate a wide range of attacks against applications, including testing for common web application vulnerabilities such as SQL injection, cross-site scripting, buffer overflows and directory traversal.
In short, Maui Security Scanner; gives you an idea whether your website is secure against web attacks, Crawler feature automatically checks for web vulnerabilites, Audits all dynamic content including password fields, shopping carts and other web applications, and Generates penetration reports that give you a certain idea about your websites security level.
Maui Security Scanner checks your application against:
- Cross Site Scripting
Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, instant message, or simply just reading a web board or email message.
- SQL Injection
SQL Injection attacks are another instantiation of an injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands.
- Blind SQL
Blind SQL injection is identical to normal SQL injection, however, when such an attack is performed a handled error message is returned. This results in no generic database error messages and without disclosing such information the attacker is working blindly.
- XPXPATH Injection
Similar to SQL Injection, XML Injection attacks occur when a web site uses user supplied information to query XML data. By sending intentionally malformed information into the web site, an attacker can find out how the XML data is structured or access data that they may not normally have access to. They may even be able to elevate their privileges on the web site if the xml data is being used for authentication (such as an xml based user file).
- LDAP Injection
LDAP (Lightweight Directory Access Protocol) Injection is an attack used to exploit web based applications that construct LDAP statements from user input. When an application fails to sufficiently sanatize user input, it may be possible for an attacker to alter the construction of an LDAP statement. Due to the nature of web based applications the process will be run with the same permissions as the web server itself. Thus this could result in the execution of the command. Such a scenario could result in granting permissions to query, modify or remove anything inside the LDAP tree.
- Remote File Inclusion
An attackers fondest wish is to be able to run their code on the target system; an RFI exploit does just that. By exploiting two very dubious features of the PHP language, an attacker can inject their code into a PHP program on the server. Once they can do that, they can access anything that the PHP program could: databases, password files, etc. They can install their own shell running with the privileges of the web server user (such as apache or httpd) and if the server has not been patched for some local user privilege escalation vulnerability, the shell could be used to become the root user.
Main features:
- Unlimited Scans
- Unlimited IPs / Hosts
- Checks for SQL Injection
- Checks for Blind SQL Injection
- Checks for Cross Site Scripting (XSS)
- Checks for Cross Frame Scripting
- Checks for File Inclusion
- Checks for PHP Code Injection
- Checks for Cross Site Scripting in URI
- Checks for directory traversal attacks
- Checks for directory listing
- Checks for file listing
- Checks for common files ( Logs / Backup etc. )
- Checks for common directories ( admin etc. )
- Checks for E-Mail addresses
- Checks for OS ( Linux / Windows …)
- Checks for Type : ( Apache / IIS …)
- Checks for Plattform ( PHP / CGI / Perl … )
- Allows to store and review every HTTP request
- Allows to export in HTML
- Allows to save scans
- Allows to load scans
- Allows to set upstream proxys
- Allows to automaticly update the software
- Allows to set the number of parallel requests
- Allows to set the crawling depth
- Allows to set the links depth per server
- Allows to set the links depth per page
- Allows to use the protocol HTTP
Version restrictions:
- 7 days or 10 scans trial

Maui Security Scanner 2.51.10 Screenshot

Maui Security Scanner 2.51.10 Keywords

Bookmark Maui Security Scanner 2.51.10

Hyperlink code:
Link for forum:

Maui Security Scanner 2.51.10 Copyright do not provide cracks, serial numbers etc for Maui Security Scanner 2.51.10. Any sharing links from, or are also prohibited.

Allok Video Splitter 2.2.0 Review:

Name (Required)
Featured Software

Want to place your software product here?
Please contact us for consideration.

Related Software
ETD Security Scanner effectively scans your entire computer and eliminates all Electronically Transmitted Diseases including spyware, adware, and trojans. Free Download
A good utility for scanning remote servers for common HTTP vulnerabilities Free Download
Yahoo Security Scanner is a free tool that checks computers who are running the Yahoo Messenger Client for misconfigurations Free Download
NT Security Scanner is a good security scanner written and maintained by Als... Free Download
Shadow Security Scanner is fastest — and best performing — security scanner in its market sector. Free Download
Using Elanize Web Security Scanner, web-site admins and IT-professionals can see whether their web site(s) are hackable or vulnerable to attacks. Identifying vulnerabilities such as SQL Injection and Free Download
Checks your network for all potential methods that a hacker might use to attack your network Free Download
Shadow Security Scanner (network vulnerability scanner) has earned the name of the fastest — and best performing — security scanner in its market sector, outperforming many famous brands. Free Download