19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHAPTER<br />

20<br />

A Web Application<br />

Hacker’s Toolkit<br />

Some attacks on <strong>web</strong> <strong>application</strong>s can be performed using only a standard <strong>web</strong><br />

browser; however, <strong>the</strong> majority of <strong>the</strong>m require you to use some additional tools.<br />

Many of <strong>the</strong>se tools operate in conjunction with <strong>the</strong> browser, ei<strong>the</strong>r as extensions<br />

that modify <strong>the</strong> browser’s own functionality, or as external tools that run<br />

alongside <strong>the</strong> browser and modify its interaction with <strong>the</strong> target <strong>application</strong>.<br />

The most important item in your toolkit falls into this latter category. It operates<br />

as an intercepting <strong>web</strong> proxy, enabling you to view and modify all <strong>the</strong><br />

HTTP messages passing between your browser and <strong>the</strong> target <strong>application</strong>. Over<br />

<strong>the</strong> years, basic intercepting proxies have evolved into powerful integrated tool<br />

suites containing numerous o<strong>the</strong>r functions designed to help you attack <strong>web</strong><br />

<strong>application</strong>s. This chapter examines how <strong>the</strong>se tools work and describes how<br />

you can best use <strong>the</strong>ir functionality.<br />

The second main category of tool is <strong>the</strong> standalone <strong>web</strong> <strong>application</strong> scanner.<br />

This product is designed to automate many of <strong>the</strong> tasks involved in attacking a<br />

<strong>web</strong> <strong>application</strong>, from initial mapping to probing for vulnerabilities. This chapter<br />

examines <strong>the</strong> inherent strengths and weaknesses of standalone <strong>web</strong> <strong>application</strong><br />

scanners and briefly looks at some current tools in this area.<br />

Finally, numerous smaller tools are designed to perform specific tasks when<br />

testing <strong>web</strong> <strong>application</strong>s. Although you may use <strong>the</strong>se tools only occasionally,<br />

<strong>the</strong>y can prove extremely useful in particular situations.<br />

747

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!