HACK STEPS
■
Walk through the application in the normal way from first access (the
“start” URL), through the login process, and then through all of the appli-
cation’s functionality. Keep a record of every URL visited, and note every
instance in which a new session token is received. Pay particular atten-
tion to login functions and transitions between HTTTP and HTTPS com-
munications. This can be achieved manually using a network sniffer such
as Wireshark or partially automated using the logging functions of your
intercepting proxy:
■
If HTTP cookies are being used as the transmission mechanism for ses-
Do'stlaringiz bilan baham: