Page 9 - Hands-On Bug Hunting for Penetration Testers
P. 9

Table of Contents

                    Tools                                                                      32
                    Using Burp                                                                 34
                Attack Surface Reconnaisance – Strategies and the Value of
                Standardization                                                                34
                    Sitemaps                                                                   35
                    Scanning and Target Reconaissance                                          37
                       Brute-forcing Web Content                                               37
                       Spidering and Other Data-Collection Techniques                          39
                           Burp Spider                                                         39
                           Striker                                                             40
                           Scrapy and Custom Pipelines                                         42
                    Manual Walkthroughs                                                        42
                    Source Code                                                                45
                    Building a Process                                                         47
                       Formatting the JS Report                                                47
                       Downloading the JavaScript                                              50
                       Putting It All Together                                                 51
                       The Value Behind the Structure                                          52
                Summary                                                                        53
                Questions                                                                      54
                Further Reading                                                                54
             Chapter 4: Unsanitized Data – An XSS Case Study                            55
                Technical Requirements                                                         56
                A Quick Overview of XSS – The Many Varieties of XSS                            56
                Testing for XSS – Where to Find It, How to Verify It                           57
                    Burp Suite and XSS Validator                                               57
                       Payload Sets                                                            61
                       Payload Options                                                         61
                       Payload Processing                                                      62
                XSS – An End-To-End Example                                                    65
                    XSS in Google Gruyere                                                      66
                    Gathering Report Information                                               69
                       Category                                                                69
                       Timestamps                                                              69
                       URL                                                                     70
                       Payload                                                                 70
                       Methodology                                                             70
                       Instructions to Reproduce                                               70
                       Attack Scenario                                                         71
                Summary                                                                        72
                Questions                                                                      72
                Further Reading                                                                72

             Chapter 5: SQL, Code Injection, and Scanners                                      73
                Technical Requirements                                                         74




                                                     [ ii ]
   4   5   6   7   8   9   10   11   12   13   14