Web Application Assessment Information

Firstly, we need to understand why Web Application Assessment is important to any organization out there. As people should be aware by now, Web Applications have played an important and vital role in an organization’s future which is also exposed to cybercriminals attacks.

A pentester will be doing Penetration Testing on the Web Application to find all vulnerabilities while the attacks need one. For Web, Application Assessment will use the testing methodology such as WSTG – Latest | OWASP Foundation

What is Burp Suite?

Burp Suite can be considered as one of the most popular Penetration Testing and Vulnerability Assessment tools that it can use for Web Application Security Assessment. For those who are not familiar with the tools, Burp Suite has normally been used to evaluate any security or vulnerability on the web-based application and the tester will proceed with the hands-on testing.

Burp Suite or also known as Burp can be classified into two categories like Professional and Community. The only difference between those categories is that the Professional version has a more advanced feature available than the Community Version of Burp Suite.

The tool Features:

FeaturesBurp Suite Community Burp Suite Professional
ProxyAllow the tester to intercept and modify requests and responsesAllow the tester to intercept and modify requests and responses
RepeaterAllows to capture, modify the packets, and retry sending the request over and overAllows to capture, modify the packets, and retry sending the request over and over
IntruderRate-limited from the Professional versionAllow spraying an endpoint with requests which sometimes used on brute-force attacks/fuzz endpoints
DecoderDecoding captured information, or encoding a payload prior and then sending the payload to the targetDecoding captured information, or encoding a payload prior and then sending the payload to the target
ComparerComparing two pieces of data at either word or byte levelComparing two pieces of data at either word or byte level
SequencerAccessing the randomness of tokens such as session cookie values or other random generated dataAccessing the randomness of tokens such as session cookie values or other random generated data
Extra FeaturesThe evidence or progress cannot be savedThe evidence or progress can be saved

The Startup of Burp Suite and Usage

We are required to start the tool for this Web Application Assessment which the step of starting up can be seen below

Disclaimer: I’m using Community Edition of the tools for demonstration

As a result, the first thing that you see after starting Burp Suite would be an interface shown as above so that we can proceed with the tools, you can click the button “Next

We can click the “Start Burp” Button on the page shown above.

Normally, it will take a few seconds for it to fully start which somehow takes some time depending on your own Operating System

Therefore, the interface is shown above only means that you have properly started Burp Suite

Firstly, we are not touching the configuration unless we need to use different IP, port and use a different client request method on Proxy Tab.

In conclusion, we need to configure our browser while we can interact with the Burp Suite tool

For example, we can capture the curl command via Burp Suite and then send the packet to Repeater

We will obtain the interface as above.

Burp Suite Attacks

Those two pictures above show that we can modify the payload which will be sent to the application. For example, we can change any information or permission to the application where it can be scary sometimes.

Another interesting attack is to play with any agent but we use User-Agentt on the screenshot above. As a result, we can use methods such as zerodiumsystem to obtain a reverse shell on the victim’s machine.

Aside from that, we also can obtain a reverse shell during a Local File Inclusion attack or also known as LFI. On the other hand, LFI is being used to get a good understanding of the directory or file residing inside the machine.

A Pentester also can use a common attack such as SQLi via Burp Suite

The sample of the output is been show above.

Categories:

No responses yet

Leave a Reply

Your email address will not be published. Required fields are marked *