- Becoming the Hacker
- Adrian Pruteanu
- 402字
- 2021-06-11 13:38:52
The attack proxy
When testing applications, traffic manipulation and recording is invaluable. The major players in this market are also extendable, allowing the community of researchers to improve functionality with free add-ons. Well-built and supported proxies are powerful weapons in the attacker's arsenal.
Burp Suite
Burp Suite is arguably the king when it comes to attack proxies. It allows you to intercept, change, replay, and record traffic out of the box. Burp Suite is highly extendable, with powerful community plugins that integrate with sqlmap (the de facto SQLi exploitation tool), automatically test for privilege escalation, and offer other useful modules:
- Proxy: Record, intercept, and modify requests on the fly
- Spider: Content discovery with powerful crawling capabilities
- Decoder: Unscramble encoded data quickly
- Intruder: A highly customizable brute-forcing module
- Repeater: Allows the replay of any request previously recorded, with the ability to modify any part of the request itself
- Scanner (pro only): A vulnerability scanner that integrates with Burp Collaborator to find obscure vulnerabilities
- Collaborator: Aids in the discovery of obscure vulnerabilities, which would normally be missed by traditional scanners
There is a free version of Burp Suite, but the professional edition of the product is well worth the investment. While the free version is perfectly usable for quick tests, it does have some limitations. Notably, the Intruder module is time-throttled, making it useless for large payloads. The Scanner module is also only available in the professional version and it is worth the price. Scanner can quickly find low-hanging fruit and even automatically leverage Collaborator to find out-of-band vulnerabilities. The free version can still intercept, inspect, and replay requests, and it can also alert of any vulnerabilities it has passively detected.

Figure 1.5: The main Burp Suite Free Edition screen
Zed Attack Proxy
OWASP's Zed Attack Proxy (ZAP) is another really great attack proxy. It is extendable and easy to use. However, it lacks some of the features of Burp Suite; for example, ZAP does not have the extensive active vulnerability scanning capabilities of Burp Suite Pro, nor does it have an automated out-of-band vulnerability discovery system comparable to Collaborator.
However, there is no time-throttling on its version of the Intruder module and all of its features are available out of the box. ZAP is open-source and it is actively worked on by hundreds of volunteers.

Figure 1.6: The main ZAP screen
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 特種木馬防御與檢測技術(shù)研究
- INSTANT Metasploit Starter
- Penetration Testing with Perl
- API攻防:Web API安全指南
- 網(wǎng)絡(luò)安全三十六計(jì):人人該懂的防黑客技巧
- Kali Linux Network Scanning Cookbook(Second Edition)
- 移動(dòng)APT:威脅情報(bào)分析與數(shù)據(jù)防護(hù)
- Applied Network Security
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- 隱私計(jì)算
- Mastering Python for Networking and Security
- 網(wǎng)絡(luò)安全實(shí)戰(zhàn)詳解(企業(yè)專供版)
- Cybersecurity Threats,Malware Trends,and Strategies
- 計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究