19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 20 n A Web Application Hacker’s Toolkit 765<br />

Figure 20-10: The results of live scanning as you browse with Burp Scanner<br />

Although <strong>the</strong> scanners in integrated testing suites are designed to be used in a<br />

different way than standalone scanners, in some cases <strong>the</strong> core scanning engine<br />

is highly capable and compares favorably with those of <strong>the</strong> leading standalone<br />

scanners, as described later in this chapter.<br />

Manual Request Tools<br />

The manual request component of <strong>the</strong> integrated testing suites provides <strong>the</strong> basic<br />

facility to issue a single request and view its response. Although simple, this<br />

function is often beneficial when you are probing a tentative vulnerability and<br />

need to reissue <strong>the</strong> same request manually several times, tweaking elements of<br />

<strong>the</strong> request to determine <strong>the</strong> effect on <strong>the</strong> <strong>application</strong>’s behavior. Of course, you<br />

could perform this task using a standalone tool such as Netcat, but having <strong>the</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!