Page 230 - Hands-On Bug Hunting for Penetration Testers
P. 230

Assessment

            Chapter 11


                   1.  It's important to ask yourselves a series of questions about any tool you are
                      thinking of adopting, analyzing how it will fit into your existing workflow, what
                      value it will add, how it is uniquely positioned to add that value, and more.
                   2.  Burp Notes, the Burp Python Scripter, and the JSON Beautifier (one of many
                      beautifiers) are just a few of the great extensions we've covered.
                   3.  ONBQ and Aircrack-ng are both best practice tools for network pentesting.
                   4.  Burp Pro gives you the Burp Scanner, automated PoC generation, and several
                      other useful Advanced Manual Tools.
                   5.  Kali Linux comes packaged with many of the tools researchers rely on. The fact
                      that it can also live-boot from a disk makes it a lightweight solution for any
                      pentesting lab.
                   6.  OSINT stands for Open Source Intelligence and is the process of gathering
                      information about a target from publicly available sources, like social media
                      profiles and public record data.
                   7.  Metasploit bills itself as an exploitation framework and is designed to both detect
                      and generate the code to exploit vulnerabilities. As a tool that shines in the
                      exploitation phase, we don't touch on it much in this book.


            Chapter 12


                   1.  DoS/DDoS attacks require extensive preventative measures, and because
                      malicious traffic often disguises itself as legitimate business, it can be difficult to
                      mitigate. This makes it out of scope - unless a specific flaw is making the service
                      more susceptible to DoS/DDoS attacks.
                   2.  Self-XSS is too limited in its effect and requires too many steps to be considered a
                      serious vulnerability. A user ultimately puts themselves at risk when performing
                      XSS, but not really anyone else.
                   3.  OPTIONS can expose debug information that could help attackers, but by itself,
                      is not a vulnerability.
                   4.  SSL vulnerabilities like BEAST require too many other compromised points to
                      present an attack scenario.
                   5.  $MJDLKBDLJOH is when an attacker hides a malicious link in a transparent or
                      obscured link under a legitimate, safe, button so that users are tricked into
                      following the black hat URL.




                                                    [ 215 ]
   225   226   227   228   229   230   231   232   233   234   235