19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

770 Chapter 20 n A Web Application Hacker’s Toolkit<br />

been identified based on <strong>the</strong> contents of responses passing through <strong>the</strong> proxy<br />

(by parsing links, forms, scripts, and so on). After you have manually mapped<br />

<strong>the</strong> <strong>application</strong>’s visible content using your browser, you may additionally use<br />

<strong>the</strong> Spider and Content Discovery functions to actively probe <strong>the</strong> <strong>application</strong> for<br />

additional content. The outputs from <strong>the</strong>se tools are also added to <strong>the</strong> site map.<br />

Web<br />

browser<br />

Recon and analysis<br />

Intercepting<br />

proxy<br />

passive<br />

spidering<br />

active<br />

spidering<br />

Spider<br />

Proxy history<br />

Site map<br />

active<br />

discovery<br />

Content<br />

discovery<br />

attack surface<br />

confirm some<br />

vulnerabilities<br />

in browser<br />

passive<br />

scanning<br />

Scanner<br />

Repeater<br />

Fuzzer<br />

Vulnerability detection<br />

and exploitation<br />

Token<br />

analyzer<br />

Vulnerabilities<br />

Figure 20-14: A typical work flow for using an integrated testing suite<br />

When you have mapped <strong>the</strong> <strong>application</strong>’s content and functionality, you can<br />

assess its attack surface. This is <strong>the</strong> set of functionality and requests that warrants<br />

closer inspection in an attempt to find and exploit vulnerabilities.<br />

When testing for vulnerabilities, you typically select items from <strong>the</strong> proxy<br />

interception window, proxy history, or site map, and send <strong>the</strong>se to o<strong>the</strong>r tools<br />

within <strong>the</strong> suite to perform specific tasks. As we have described, you can use <strong>the</strong><br />

fuzzing tool to probe for input-based vulnerabilities and deliver o<strong>the</strong>r attacks<br />

such as harvesting sensitive information. You can use <strong>the</strong> vulnerability scanner<br />

to automatically check for common vulnerabilities, using both passive and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!