Page 153 - Hands-On Bug Hunting for Penetration Testers
P. 153

Access Control and Security Through Obscurity                               Chapter 8

            By highlighting any fields you come across, Burp allows you to pick up on secret info at the
            same time you're mapping your target application's attack surface.



            Data Leakage ` An End-to-End Example

            Let's try out some of our new techniques on WebGoat, OWASP's deliberately-vulnerable
            Java application. After navigating to MPDBMIPTU      8FC(PBU, go ahead and click on
            the link to register a new user and then log in.


            After you've logged in, you should be on the main WebGoat welcome page:
















































                                                    [ 138 ]
   148   149   150   151   152   153   154   155   156   157   158