Hack in one click. Comparing automated vulnerability scanners