tion’s responses for any anomalies that indicate that the flaw may be
present. In a large application, your initial mapping exercises may iden-
tify dozens of distinct requests which you need to probe, each contain-
ing numerous different parameters. To test each case manually is
time-consuming and mind-numbing, and liable to leave a large part of
the attack surface neglected. Using bespoke automation, however, you
can very quickly generate huge numbers of requests containing com-
mon attack strings, and quickly assess the server’s responses to home in
on interesting cases that merit further investigation. This technique is
often referred to as fuzzing.
We will examine in detail each of these three situations, and the ways in
which bespoke automated techniques can be leveraged to vastly enhance your
attacks against an application.
Do'stlaringiz bilan baham: