Page 26 - Hands-On Bug Hunting for Penetration Testers
P. 26

Joining the Hunt                                                            Chapter 1

            Here's a brief overview of some of the technologies we will be using:

                      Burp Suite is a versatile program that can intercept web traffic (Burp Proxy),
                      trigger application information submission (Burp Intruder), scan input against
                      malicious code snippets (Burp Scanner), and d with the possibilities offered by
                      extensions d a multitude of other things. We'll go over both using the native Burp
                      functionality as well as how to incorporate simple extensions. Some of the paid
                      functionalities, such as Burp Scan, will only receive an overview, in favor of
                      focusing on the features available in the free version.
                      Nmap, sqlmap, wfuzz, arachnid, and other CLI programs are great for their
                      ability to be assembled into larger workflows, feeding information into adjacent
                      tools (Burp and others), kicking off other automation, or consistently visualizing
                      a target's attack surface.
                      Deliberately vulnerable web applications are a different category of tooling d less
                      for use in an actual pentesting engagement and designed more to either test out
                      new ideas or calibrate an existing method or technology for those times when
                      you need to return a positive result for a specific vulnerability. We'll be doing
                      both with our use of deliberately vulnerable web apps, such as Google Gruyere,
                      Target Range, DAMN vulnerable web app, and others. You can find a list of
                      more DVWA in the sites section of $IBQUFS   , Going Further.
            While we'll be going through the setup for these tools as we use them, it's still a good idea
            to poke around their installation and documentation pages. Because of their depth, many of
            these tools will have useful functionalities that we simply won't be able to completely cover
            in the course of our work. We'll also only skim the surface of tools not specific to
            securitybthe notebtaking, logging, and other general productivity functionality
            represented by those apps can easily be replaced by whatever analogue you're most
            comfortable with.






















                                                    [ 11 ]
   21   22   23   24   25   26   27   28   29   30   31