Gaining Access Scanning and Enumeration Maintaining Access Reconnaissance admin See author's posts Post navigation What kind of detection techniques is being used in antivirus software’s that identifies malware by collecting data from multiple protected systems and instead of analyzing files locally it’s made on the provider’s environment. When you are testing a web application, it is very useful to employ a proxy tool to save every request and response. You can manually test every request and analyze the response to find vulnerabilities. You can test parameter and headers manually to get more precise results than if using web vulnerability scanners. What proxy tool will help you find web vulnerabilities?