19.09.2017 Views

the-web-application-hackers-handbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

772 Chapter 20 n A Web Application Hacker’s Toolkit<br />

required. What <strong>the</strong>se browser extensions do is provide a quick and easy way to<br />

instrument <strong>the</strong> functionality of a standard browser without interfering with <strong>the</strong><br />

network-layer communications between <strong>the</strong> browser and server. This approach<br />

<strong>the</strong>refore enables you to submit arbitrary requests to <strong>the</strong> <strong>application</strong> while<br />

allowing <strong>the</strong> browser to use its normal means of communicating with <strong>the</strong><br />

problematic <strong>application</strong>.<br />

Numerous extensions are available for both Internet Explorer and Firefox<br />

that implement broadly similar functionality. We will illustrate one example<br />

of each. We recommend that you experiment with various options to find <strong>the</strong><br />

one that best suits you.<br />

You should note that <strong>the</strong> functionality of <strong>the</strong> existing browser extensions is<br />

very limited in comparison to <strong>the</strong> main tool suites. They do not perform any<br />

spidering, fuzzing, or vulnerability scanning, and you are restricted to working<br />

completely manually. Never<strong>the</strong>less, in situations where you are forced to use<br />

<strong>the</strong>m, <strong>the</strong>y will enable you to perform a comprehensive attack on your target<br />

that would not be possible using only a standard browser.<br />

Tamper Data<br />

Tamper Data, shown in Figure 20-15, is an extension to <strong>the</strong> Firefox browser.<br />

Anytime you submit a form, Tamper Data displays a pop-up showing all <strong>the</strong><br />

request details, including HTTP headers and parameters, which you can view<br />

and modify.<br />

Figure 20-15: Tamper Data lets you modify HTTP request details within Firefox<br />

TamperIE<br />

TamperIE, shown in Figure 20-16, implements essentially <strong>the</strong> same functionality<br />

within <strong>the</strong> Internet Explorer browser as Tamper Data does on Firefox.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!