Positioning Payloads
Burp Intruder uses a similar conceptual model to JAttack, based on position-
ing payloads at specific points within a request, and one or more payload
sources. However, it is not restricted to inserting payload strings into the val-
ues of the actual request parameters — payloads can be positioned at a sub-
part of a parameter’s value, or at a parameter’s name, or indeed anywhere at
all within the headers or body of a request.
Having identified a particular request to use as the basis for the attack, each
payload position is defined using a pair of markers, to indicate the start and
end of the insertion point for the payload, as shown in Figure 13-1.
Do'stlaringiz bilan baham: |