The Basics

  • Features
    • Proxy
      • interception and modification of requests and responses while interacting
    • Repeater
      • capturing, modifying and resending same request multiple times
      • useful for crafting payloads
    • Intruder
      • spaying endpoints with requests
      • brute force attacks or fuzzing endpoints
    • Decoder
      • decode captured information or encode payloads before sending them
    • Comparer
      • enables comparison of two pieces of data
      • at word or byte level
    • Sequencer
      • assessing randomness of token
      • can expose lack of secure randomness

Proxy

  • intercepting requests
    • requests will be intercepted and HELD BACK
    • can be edited, dropped or send in this state
  • taking control
    • complete control over web traffic
  • capture and logging
    • capture and log requests made through proxy
    • even when interception is turned off
  • websocket support
    • capture and log websocket communication
  • logs and history
    • retrospective analysis and sending the requests to other modules as needed

Site Map and Issue Definitions

  • site map
    • map out web applications in a tree structure
    • auto generates site maps through usage of app
    • or auto crawl pages
  • issue definitions
    • list of web vulnerabilities
  • scope settings
    • include or exclude ips or domains
    • focus on target

Repeater

  1. Record a request using the proxy module
  2. Action –> Send to repeater
  3. Edit values
  4. ???
  5. Profit

Intruder

Attack Types

Sniper

  • effective for single position attacks
    • password brute force
    • fuzzing api endpoints
  • provide set of payloads, e.g. wordlist, range of numbers or letters
  • rotates given payloads

Battering Ram

  • inserts same payload into every position simultaneously
  • useful when testing against multiple positions, without need for sequential substitution

Pitchfork

  • one payload set per position
  • multiple snipers at once
    • one list per sniper
  • all testet simultaneously

Cluster Bomb

  • one payload set per position
  • iterates through each set individually
  • ensures every possible combination is tested
Last modified 2023.10.16