Page 49 - Hands-On Bug Hunting for Penetration Testers
P. 49

Preparing for an Engagement                                                 Chapter 3

            Using Burp

            Now let's start Burp d the  ( part of the command is where we're specifying Burp Suite
            should run on 4 GB memory:
                java -jar -Xmx4G "/Applications/Burp Suite Community
                Edition.app/Contents/java/app/burp/burpsuite_community_1.7.33-9.jar"
            Since this is a mouthful, we can create a small wrapper script that will use the  ! variable
            to add any options we may want to pass, without making us rewrite our path to the  KBS
            executable. Here's CPPUTUSBQ@CVSQ TI:
                #!/bin/sh

                java -jar -Xmx3G "/Applications/Burp Suite Community
                Edition.app/Contents/java/app/burp/burpsuite_community_1.7.33-9.jar" $@

            Now you can make the file executable and symlink it to  VTS MPDBM CJO or the
            appropriate utility so it's available in your  1"5):
                chmod u+x bootstrap_burp.sh
                sudo ln -s /Full/path/to/bootstrap_burp.sh /usr/local/bin/bootstrap_burp
            This allows us to start the program with just CPPUTUSBQ@CVSQ.



            Attack Surface Reconnaisance ` Strategies

            and the Value of Standardization


            The Attack Surface of an application is, put succinctly, wherever data can enter or exit the
            app. Attack-surface analysis describes the methods used to describe the vulnerable parts of
            an application. There are formal processes, such as the Relative
            Attack Surface Quotient (RASQ) developed by Michael Howard and other researchers at
            Microsoft that counts a system's attack opportunities and indicates an app's general
            attackability. There are programmatic means available through scanners and manual
            methods, involving navigating a site directly, documenting weak points via screenshots
            and other notes. We'll talk about low- and high-tech methods you can use to focus your
            attention on profitable lines of attack, in addition to methods you can use to find hidden or
            leftover content not listed on the sitemap.







                                                    [ 34 ]
   44   45   46   47   48   49   50   51   52   53   54