eCPPTv2-PTP-Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝eCPPTv2 / PTP - Notes
  • 1️⃣1 - ​System Security
    • 1.1 Architecture Foundamentals
    • 1.2 Assemblers and Tools
    • 1.3 Buffer Overflow
    • 1.4 Cryptography
    • 1.5 Malware
    • 1.6 Shellcoding
  • 2️⃣2 - Network Security
    • 2.1 System/Host Based Attacks
      • 2.1.1 Windows Vulnerabilities
    • 2.2 Network Based Attacks
    • 2.3 The Metasploit Framework (MSF)
      • MSF Introduction
      • Information Gathering & Enumeration
      • Vulnerability Scanning
      • Client-Side Attacks
      • Post Exploitation
      • Armitage
    • 2.4 Exploitation
    • 2.5 - Post Expolitation / Pivoting
      • 2.5.1 Pivoting Guidelines
      • 2.5.2 Pivoting Example (3 Targets)
    • 2.6 Social Engineering
  • 3️⃣3 - PowerShell for PT
    • 3.1 PowerShell
  • 4️⃣4 - Linux Exploitation
    • 4.1 Linux Vulnerabilities
    • 4.2 Linux Exploitation
    • 4.3 Linux Post-Exploitation
    • 4.4 Linux Privilege Escalation
      • 4.4.1 Kernel Exploitation
      • 4.4.2 SUID Exploitation
      • 4.4.3 CronJobs
  • 5️⃣5 - Web App Security
    • 5.1 - Web App Concepts
      • 5.1.1 HTTP/S Protocol
      • 5.1.2 Encoding
      • 5.1.3 Same Origin
      • 5.1.4 Cookies
      • 5.1.5 Session
      • 5.1.6 Web App Proxies
    • 5.2 - Information Gathering
      • 5.2.1 Gathering Information on Your Targets
      • 5.2.2 Infrastructure
      • 5.2.3 Fingerprinting Frameworks and Applications
      • 5.2.4 Fingerprinting Custom Applications
      • 5.2.5 Enumerating Resources
      • 5.2.6 Information Disclosure Through Misconfiguration
      • 5.2.7 Google Hacking
      • 5.2.8 Shodan HQ
    • 5.3 - Cross Site Scripting
      • 5.3.1 XSS Anatomy
      • 5.3.2 Reflected XSS
      • 5.3.3 Stored XSS
      • 5.3.4 DOM-Based XSS
      • 5.3.5 Identifying & Exploiting XSS with XSSer
    • 5.4 - SQL Injection
      • 5.4.1 Introduction to SQL Injection
      • 5.4.2 Finding SQL Injection
      • 5.4.3 Exploiting In-Band SQL Injection
      • 5.4.4 Exploiting Error-Based SQL Injection
      • 5.4.5 Exploiting Blind SQL Injection
      • 5.4.6 SQLMap
      • 5.4.7 Mitigation Strategies
      • 5.4.8 From SQLi to Server Takeover
    • 5.5 - Other Common Web Attacks
      • 5.5.1 Session Attacks
      • 5.5.2 CSRF
  • 6️⃣6 - ​Wi-Fi Security
    • 6.1 Traffic Analysis
  • 7️⃣7 - ​Metasploit & Ruby
    • 7.1 Metasploit
  • 📄Report
    • How to write a PT Report
  • 🛣️RoadMap & My Experience
  • 📔eCPPT Cheat Sheet
Powered by GitBook
On this page
  • Web Application Proxies
  • Burp Suite
  • Scanning & Enum Tools
  1. 5 - Web App Security
  2. 5.1 - Web App Concepts

5.1.6 Web App Proxies

Web Application Proxies

Web applications often consist of various components such as scripts, images, style sheets, client, and server-side intelligence. Tools aiding in the examination and analysis of web application behavior are crucial.

An intercepting proxy is a tool enabling the analysis and modification of any request or response exchanged between an HTTP client and a server. This allows a penetration tester to study a web application's behavior and manually test for vulnerabilities.

Burp Suite

One of the most commonly used intercepting proxies is Burp Suite, available for download in the Free Edition or included in Kali Linux. Key features include:

  • Intercepting requests and responses between the browser and the web server.

  • Manual request construction, allowing for detailed control.

  • Website crawling, automatically visiting every page to analyze.

  • Fuzz testing, sending patterns of valid and invalid inputs to test behavior.

To use Burp Suite:

  1. Configure the proxy settings in the Options sub-tab under the Proxy tab.

  2. Set up your browser to use Burp as a proxy for all protocols.

  3. Enable interception in Burp, allowing modification of requests before they are sent.

Burp Proxy can intercept and modify requests manually, either by altering the header and body of a message or through automatic processes. The tool provides various configuration options for fine-tuning message interception.

Additionally, Burp Suite includes a Repeater feature for manually building raw HTTP requests. This allows syntax highlighting, raw and rendered response viewing, and integration with other Burp tools.

Steps for Burp Repeater:

  1. Set the target by clicking the pencil icon in the upper right corner.

  2. Define the target host and port.

  3. Create the request using the text area, ensuring it includes at least an HTTP verb (GET, POST), a HOST header, and two empty lines after the headers.

  4. Click the Go button to send the request to the server, and view the response in the Response panel.

Remember, Burp Proxy can collect information on HTTP traffic even with interception turned off, viewable in the History tab or the Site Map tab.

Web application proxies, particularly intercepting proxies like Burp Suite, are essential tools for analyzing and testing web applications. They provide insights into application behavior, enable vulnerability testing, and offer features for manual request construction and modification.

These tools should not be confused with common web proxy servers like Squid, which serve different purposes such as bandwidth optimization and content filtering.

Scanning & Enum Tools

There're others tools that help us to find information of a web app

Previous5.1.5 SessionNext5.2 - Information Gathering

Last updated 1 year ago

Directory Enumeration - ​

​ - a tool used to brute-force URIs including directories and files as well as DNS subdomains.

Directory Enumeration - ​

​ - an integrated platform for performing security testing of web applications.

Scanning WebApp - ​

​ - OWASP Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications.#

Scanning WebApp - ​

​ - a pluggable web server and CGI scanner written in Perl, using rfp’s LibWhisker to perform fast security or informational checks.# Kali Linux Installsudo apt update && sudo apt install -y nikto

5️⃣
Gobuster
Gobuster
BurpSuite
BurpSuite
ZAProxy
Zaproxy
Nikto
Nikto
Burp Suitehttps://portswigger.net/burp https://www.kali.org/tools/burpsuite/ https://tryhackme.com/room/burpsuitebasics
Gobusterhttps://www.kali.org/tools/gobuster/
Burp Suitehttps://portswigger.net/burp https://www.kali.org/tools/burpsuite/ https://tryhackme.com/room/burpsuitebasics
Zaphttps://www.zaproxy.org/docs/
Niktohttps://www.kali.org/tools/nikto/