19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 14 n Automating Customized Attacks 609<br />

The configuration needed to apply Burp’s session handling functionality to<br />

<strong>the</strong> features of real-world <strong>application</strong>s is often complex, and mistakes are easily<br />

made. Burp provides a tracer function for troubleshooting <strong>the</strong> session handling<br />

configuration. This function shows you all of <strong>the</strong> steps performed when Burp<br />

applies session handling rules to a request, allowing you to see exactly how<br />

requests are being updated and issued, and identify whe<strong>the</strong>r your configuration<br />

is working in <strong>the</strong> way that you intended. The session handling tracer is<br />

shown in Figure 14-16.<br />

Figure 14-16: Burp’s session handling tracer, which lets you monitor and debug your<br />

session handling rules<br />

Having configured and tested <strong>the</strong> rules and macros that you need to work<br />

with <strong>the</strong> <strong>application</strong> you are targeting, you can continue your manual and automated<br />

testing in <strong>the</strong> normal way, just as if <strong>the</strong> obstacles to testing did not exist.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!