- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 238字
- 2021-07-02 12:16:37
Auditor/Scanner
Let's go ahead and understand the Burp Audit/Scanner rules and mechanism. Burp Auditor is mainly divided into the three following core categories:
- Passive phase
- Active phase
- JavaScript analysis phase
This allows Burp to actively spot and exploit functions that are stored and returned to the user in response to input. It also helps to avoid duplication by handling frequently occurring issues and insertion points in an optimal manner. Also, it effectively makes use of the system resources by executing work in parallel.
Burp Auditor reports tons of issues, widely ranging into the following categories:
- Passive: This is a non-intrusive audit that does analysis purely on the basis of the request and response received by a normal user traversal and form submissions.
- Light Active: This entails minor updates and changes done by Burp to find nominal flaws, such as cross-origin resource sharing.
- Medium Active: Here, Burp sends a few requests that an application might parse as malicious. The best example would be OS injection commands.
- Intrusive Active: Burp sends requests that might be more dangerous in nature and are likely to be detected if there are Web Application Firewalls (WAF) in place (for example, SQL injection).
- JavaScipt analysis: These are the ones that do a JavaScript-based analysis. The best example of this would be Document Object Model (DOM) based cross-site scripting.
In the following section, we will understand how Burp Scanner targets the various insertion points.
推薦閱讀
- 數據恢復方法及案例分析
- 計算機網絡安全技術(第6版·慕課版)
- 安全實戰之滲透測試
- Mastering Kali Linux for Advanced Penetration Testing
- 工業控制網絡安全技術
- 網絡安全技術及應用(第3版)
- 同態密碼學原理及算法
- 黑客攻防與無線安全從新手到高手(超值版)
- 軟件開發安全之道:概念、設計與實施
- Computer Forensics with FTK
- Instant Java Password and Authentication Security
- Web安全之深度學習實戰
- 黑客攻防實戰從入門到精通
- 信息技術基礎:提高篇·實驗與習題
- CTF快速上手:PicoCTF真題解析(Web篇)