19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 20 n A Web Application Hacker’s Toolkit 763<br />

described in detail <strong>the</strong> different ways in which automation can be used in customized<br />

attacks. Most test suites include functions that leverage automation to<br />

facilitate various common tasks. Here are some commonly implemented features:<br />

n Manually configured probing for common vulnerabilities. This function<br />

enables you to control precisely which attack strings are used and how <strong>the</strong>y<br />

are incorporated into requests. Then you can review <strong>the</strong> results to identify<br />

any unusual or anomalous responses that merit fur<strong>the</strong>r investigation.<br />

n A set of built-in attack payloads and versatile functions to generate arbitrary<br />

payloads in user-defined ways — for example, based on malformed<br />

encoding, character substitution, brute force, and data retrieved in a<br />

previous attack.<br />

n The ability to save attack results and response data to use in reports or<br />

incorporate into fur<strong>the</strong>r attacks.<br />

n Customizable functions for viewing and analyzing responses — for example,<br />

based on <strong>the</strong> appearance of specific expressions or <strong>the</strong> attack payload<br />

itself (see Figure 20-9).<br />

n Functions for extracting useful data from <strong>the</strong> <strong>application</strong>’s responses — for<br />

example, by parsing <strong>the</strong> username and password fields in a My Details<br />

page. This can be useful when you are exploiting various vulnerabilities,<br />

including flaws in session-handling and access controls.<br />

Figure 20-9: The results of a fuzzing exercise using Burp Intruder

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!