Web Vulnerability Scanners
Acunetix
SVM supports both Acunetix 10.5 (local) and Acunetix 11/12 (Enterprise API).Acunetix 11/12 API Configuration
Obtain API Credentials
Log into your Acunetix installation and generate an API key from the user profile settings.
Configure API Settings
In SVM, navigate to Configuration → Web Scanners → AcunetixEnter the following details:
- API URL:
https://[your-acunetix-server]:3443 - API Key: Your generated API key
Scan Configuration Options
The Acunetix integration supports advanced scan configurations:Built-in Scan Profiles
- Full Scan:
11111111-1111-1111-1111-111111111111 - High Risk Vulnerabilities:
11111111-1111-1111-1111-111111111112 - XSS Vulnerabilities:
11111111-1111-1111-1111-111111111116 - SQL Injection:
11111111-1111-1111-1111-111111111113 - Weak Passwords:
11111111-1111-1111-1111-111111111115 - Crawl Only:
11111111-1111-1111-1111-111111111117
Report Templates
Acunetix provides multiple report formats:- Developer:
11111111-1111-1111-1111-111111111111 - Quick:
11111111-1111-1111-1111-111111111112 - Executive Summary:
11111111-1111-1111-1111-111111111113 - OWASP Top 10 2017:
11111111-1111-1111-1111-111111111125 - PCI DSS 3.2:
11111111-1111-1111-1111-111111111120 - Affected Items:
11111111-1111-1111-1111-111111111115(default in SVM)
SVM automatically exports reports in both HTML and PDF formats. The scan script includes a 20-second delay multiplied by the URL number to prevent overwhelming the Acunetix server.
Burp Suite
Configure Burp Suite Professional for web application testing:Select Executable
Browse and select your Burp Suite JAR or executable file. SVM supports custom executable paths (fixed in version 1.1.790).
Netsparker
Configure Netsparker for automated web application security scanning:Arachni
Configure Arachni Web Application Scanner for remote scanning:Set Remote Server Details
Navigate to Configuration → Web Scanners → ArachniConfigure your Arachni server:
- Server Address: IP or hostname
- Port: Default Arachni port
- Credentials: If authentication is enabled
Web URLs must have the
http:// or https:// protocol specified to launch Arachni scans successfully.Service Vulnerability Scanners
Nessus
Configure Tenable Nessus for network and service vulnerability scanning.Connection Settings
Configure Nessus Server
Navigate to Configuration → Service Scanners → NessusEnter connection details:
- Server: Nessus server hostname or IP
- Port: HTTPS port (default:
8834) - Username: Nessus user account
- Password: Account password
Service Management
If Nessus service is not running, start it manually:Policy Configuration
Retrieve Scan Policies
SVM automatically fetches available scan policies from your Nessus server using the API.
Export Formats
Nessus scans are exported in multiple formats (added in version 1.1.792):- HTML: Human-readable report format
- XML/Nessus: Machine-readable format for importing into SVM
The User-Agent was updated in version 1.1.794 to ensure compatibility with Nessus 7 and later versions.
OpenVAS
Configure OpenVAS (Open Vulnerability Assessment System) for comprehensive vulnerability scanning.Connection Configuration
Configure OpenVAS Manager
Navigate to Configuration → Service Scanners → OpenVASConfigure connection parameters:
- Server: OpenVAS Manager hostname/IP
- Port: OMP port (default:
9390) - Username: OpenVAS user account
- Password: Account password
Scan Configurations
Report Formats
Remote OpenVAS Configuration
For remote OpenVAS installations:Configure SSH Access
Set up SSH credentials for remote server access:
- SSH Server: Remote server IP/hostname
- SSH Username: Linux user account
- SSH Password: Account password
Install Remote Tools
Navigate to Tools → Install → Remote → OpenVAS to install required components on the remote server.
OpenVAS configuration retrieval displays detailed error messages when authentication fails, helping troubleshoot connection issues (improved in version 1.1.791).
Editing Scripts
Plugin Management
Qualys
Configure Qualys Community or Enterprise for cloud-based vulnerability scanning.API Configuration
Configure Qualys Credentials
Navigate to Configuration → Service Scanners → QualysEnter your Qualys account details:
- Username: Qualys account username
- Password: Qualys account password
API Endpoint
SVM connects to Qualys API at:Report Templates
Configuration retrieval issues are now properly displayed with descriptive error messages (fixed in version 1.1.791).
Network Scanning Tools
Nmap
Configure Nmap for network discovery and port scanning.Local Nmap Configuration
Remote Nmap Installation
Scanning Web/Domains
Version 2.0.3 added the ability to launch Nmap scans against Web/Domains directly from the project interface.
Information Gathering Tools
Recon-ng
Configure Recon-ng for reconnaissance and information gathering.Configuration
Set API Keys
Configure API keys for various reconnaissance services:
- SHODAN API Key: For Shodan queries
- IPInfoDB API Key: For IP geolocation
- Other service API keys as needed
Domain Scanning
The Recon-ng executable path was updated in version 2.0.0 for better compatibility. Configuration saving was fixed in version 2.0.1.
EyeWitness
Configure EyeWitness for web application screenshot capture.Local Configuration
Remote Configuration
EyeWitness and Java remote installation options were added to the Tools menu in version 1.1.792.
Android Security Tools
MobSF (Mobile Security Framework)
Configure MobSF for Android application security analysis.Configure MobSF Server
Navigate to Configuration → Android Tools → MobSFEnter server details:
- Server URL: MobSF web interface URL
- API Key: MobSF API key
APK Tools
Configure tools for APK analysis and manipulation.Android Debug Bridge (ADB)
- Version 1.0.39 included (updated in version 2.1.0)
- No additional configuration required
- Automatically detected when Android device is connected
Apktool
Other Android Tools
- Enjarify: DEX to JAR conversion
- JD-Gui: Java decompiler (version 1.5.2 link updated in 2.1.0)
- QARK: Quick Android Review Kit (script updated in version 1.1.794)
- AndroBugs Framework: Static analysis
- Uber APK Signer: APK signing tool (version 1.0.0 link updated in 2.1.0)
All Android tool configurations were updated in version 2.1.0 with the latest download links and version information.
General Scanner Configuration Tips
Certificate Handling
For scanners with self-signed certificates (OpenVAS, Nessus):- SVM’s integrated web browser can access pages with invalid certificates (fixed in version 1.1.789)
- No additional certificate configuration required
Script Management
Update All Scripts
Navigate to Tools → Update Scripts and Tools to download the latest versions of all integration scripts.
Edit Scripts
All
.bat and .sh scripts are open source and can be edited to customize scanner behavior.SSH Configuration for Remote Scanners
For remote scanner execution:Install PuTTY Tools
SVM uses PuTTY tools for SSH connectivity:
- PLink: Version 0.70 (updated in version 1.1.793)
- PSCP: Version 0.70 (updated in version 1.1.793)
Configure SSH Credentials
Enter SSH credentials in scanner configuration:
- Server: Remote server hostname/IP
- Username: SSH username
- Password: SSH password
Remote scanner scripts were improved in version 1.1.794 to properly copy files to remote servers (OpenVAS and QARK scripts fixed).
Troubleshooting
Common Configuration Issues
Connection Testing
Always test scanner connections after configuration:- Save your configuration
- Click “Test Connection”
- Review error messages for authentication or network issues
- Verify firewall rules allow outbound connections
- Check scanner service status on remote servers
Error Messages
SVM provides detailed error messages for configuration issues:- Authentication failures: Check username/password
- Connection timeouts: Verify server address and port
- SSL/TLS errors: Ensure proper certificate handling
- API errors: Verify API keys and permissions
Configuration error handling was significantly improved in version 2.0.3, providing more descriptive messages for troubleshooting.