Saturday, July 5, 2014

Introduction Burp Suite Part VI (Sequencer Tab)


Burp Sequencer is a tool for analyzing the quality of randomness in an application's session tokens and other important data items that are intended to be unpredictable.




Live Capture
 To perform a live capture, you need to locate a request within the target application that returns somewhere in its response the session token or other item that you want to analyze. You can do this by selecting a request anywhere within Burp and choosing the "Send to Sequencer" option from the context menu. The steps needed to configure the live capture on this request are described below.

Select Live Capture Request
 The live capture request list shows the requests that you have sent to Sequencer from other Burp tools. Select the request that returns the token or other item that you want to analyze.
(Click image for large view)

Token Location Within Response
 Select the location within the application's response where the token appears. The following options are available:
  • Cookie - If the response sets any cookies, this option will let you select a cookie to analyze. This is the most common method of passing session tokens to clients.
  • Form field - If the response contains any HTML form fields, this option will let you select a form field value to analyze. This method is often used for transmitting anti-CSRF tokens and other per-page tokens to clients.
  • Custom location - You can use this option to specify a specific custom location within the response containing the data you want to analyze. This is done using the response extraction rule dialog.
Live Capture Options
 These settings control the engine used for making HTTP requests and harvesting tokens when performing the live capture. The following options are available: 
  • Number of threads - This option controls the number of concurrent requests the live capture is able to make.
  • Throttle between requests - Optionally, the live capture can wait a specified delay (in milliseconds) before every request. This option is useful to avoid overloading the application, or to be more stealthy.
  • Ignore token whose length deviates by X characters - You can optionally configure the live capture to ignore tokens whose length deviates by a given threshold from the average token length. This can be useful if the application occasionally returns an anomalous response containing a different item in the location where the token normally appears.

Running the Live Capture
 When you have fully configured the live capture, click the "Start live capture" button to begin the live capture. Burp Sequencer will repeatedly issue your request and extract the relevant token from the application's responses.
 During the live capture, a progress bar is shown, with counters of the numbers of tokens, requests, and network errors. The following options are available: 
  • Pause / resume - This temporarily pauses, and resumes, the capture.
  • Stop - This permanently stops the capture.
  • Copy tokens - This copies the currently captured tokens to the clipboard, for use in other Burp attacks (such as in Intruder payloads) or tools.
  • Save tokens - This saves the currently captured tokens to file.
  • Auto-analyze - If this option is enabled, Burp will automatically perform token analysis and update the results periodically during the live capture.
  • Analyze now - This is available when a minimum of 100 tokens have been captured, and causes Burp to analyze the current sample and update the results.
Manual Load
 This function allows you to load Sequencer with a sample of tokens that you have already obtained, and then perform the statistical analysis on the sample.
 To perform a manual load, you first need to obtain your own sample of tokens from the target application through some means, such as your own script or the output from an earlier live capture, or an Intruder attack. The tokens need to be in a simple newline-delimited text format.
 Use the Paste button to paste the tokens from the clipboard, or the Load button to load them from file. The loaded tokens, together with details of the shortest and longest lengths, are displayed for you to sense-check that the sample has loaded correctly.
 To perform the analysis of the loaded tokens, click the "Analyze now" button.

Analysis Options
 The "Analysis options" tab lets you configure how tokens are handled, and which types of tests are performed during the analysis.

Token Handling
 These settings control how tokens are handled during analysis. The following options are available:
  • Pad short tokens at start / end - If the tokens produced by the application have variable length, these will need to be padded to enable the statistical tests to be performed. You can choose whether the padding should be applied at the start or the end of each token. In most cases, padding tokens at the start is most appropriate.
  • Pad with - You can specify the character that will be used for padding. In most cases, for numeric or ASCII hex-encoded tokens, padding with the "0" character is most appropriate.
  • Base64-decode before analyzing - If the tokens are Base64-encoded, you can configure Burp to decode these before analyzing, which will generally improve the accuracy of the analysis.
Token Analysis
 These options control the types of analyses that are performed. You can individually enable or disable each type of character-level and bit-level test. Sometimes, after performing an initial analysis with all tests enabled, you may want to disable certain tests to reflect your better understanding of the tokens' characteristics, or to isolate the effects of any unusual characteristics manifested by your sample.
 In the results window, after modifying any of the analysis options you can click the "Redo analysis" button to re-perform the analysis with your new settings, and update the results.
(Click image for large view)

Like it ? Share it.

Tuesday, July 1, 2014

Orkut going to shutdown officially


Google launched Orkut in January 2004, and now It was announced today that Google intends to shut down its very first social network, Orkut. As of September 30, 2014, Orkut will no longer be available.

The Orkut Team Says : 
Ten years ago, Orkut was Google’s first foray into social networking. Built as a “20 percent” project, Orkut communities started conversations, and forged connections, that had never existed before. Orkut helped shape life online before people really knew what “social networking” was.
Over the past decade, YouTube, Blogger and Google+ have taken off, with communities springing up in every corner of the world. Because the growth of these communities has outpaced Orkut's growth, we've decided to bid Orkut farewell (or, tchau). We'll be focusing our energy and resources on making these other social platforms as amazing as possible for everyone who uses them.
It's been a great 10 years, and we apologize to those still actively using the service. We hope people will find other online communities to spark more conversations and build even more connections for the next decade and beyond.




Eric Schmidt, former CEO of Google and current executive chairman, has repeatedly admitted over the years that his biggest mistake running the company was missing out on social. “In our defense," he said in one interview late last year, "we were busy working on many other things but we should have been in that area and I take responsibility for that."

If you were a user of Orkut, you will be able to export data using Google Takeout until September 2016. The Orkut team also intends to preserve an archive of all public communities, which will be available online starting September 30, 2014.


Like it ? Share it.

Monday, June 30, 2014

Introduction Burp Suite Part V (Repeater Tab)


Burp Repeater is a simple tool for manually manipulating and reissuing individual HTTP requests, and analyzing the application's responses. You can use Repeater for all kinds of purposes, such as changing parameter values to test for input-based vulnerabilities, issuing requests in a specific sequence to test for logic flaws, and reissuing requests from Burp Scanner results to manually verify reported issues.
The easiest way to start working with Repeater is to select the request you want to work on within another Burp tool (such as the Proxy history or Target site map), and use the "Send to Repeater" option on the context menu. This will create a new request tab in Repeater, and automatically populate the target details and request message editor with the relevant details. You can then modify and issue the request as required.
 When your request is ready to send, click the "Go" button to send it to the server. The response is displayed when this is received, together with the response length and a timer (in milliseconds). You can use the usual HTTP message editor functions to help analyze the request and response messages, and carry out further actions.

Managing Request Tabs
 You can easily manage Repeater's request tabs. You can: 
  • Rename tabs by double-clicking the tab header.
  • Reorder tabs by dragging them.
  • Open a new tab by clicking on the right-most "..." tab.
  • Close tabs by clicking the X button in the tab header.
(Click image for large view)



Like it ? Share it.

Wednesday, June 25, 2014

How to use macchanger in kali linux

How to change MAC address in Kali linux/ How to use macchanger in Kali linux
Intro – A Media Access Control address or MAC address is a unique identifier assigned to network interfaces. This uses for communications when connected to the network. Although MAC addresses is a unique identifier of network adapter.
eth0 is a network interface (LAN), if you want change MAC address of wireless interface you can change eth0 with wlan0

1. How to open macchanger
A. GUI Method
Application → Kali Linux → Sniffing/Spoofing → Network Spoofing → macchanger
                                                                            (click on image for large view)

B. open Terminal type macchanger and hit enter

2. If you want to see help option of macchanger. Type macchanger --help and hit enter 

3. Run ifconfig command on terminal to see your interface name and current MAC address

4. Before changing your MAC address you have to shut down your interface.
Syntax – ifconfig interfacename down
Ex – ifconfig eth0 down
Note – write interface name according to your interface name.

5. Now time to change MAC address.
Syntax – macchanger –r interfacename
EX – macchanger –r eth0
As result you can see there are three MAC addresses first 2 addresses are our original  MAC addresses and 3rd MAC address is FAKE.

6. After changing MAC address you have to up your interface.
Syntax – ifconfig interfacename up
Ex – ifconfig eth0 up

7. Run ifconfig command in terminal to check MAC address and there you can see we have successfully changed our MAC address. 
 
(click on image for large view)




Like it ? Share it.

Domain Name System

What is Domain Name ?
A domain name is an identification string that defines a realm of administrative autonomy, authority or control on the Internet. Domain Name System, or DNS, is the most recognized system for assigning addresses to Internet web servers. Domain names are used to identify one or more IP addresses. Without a domain, you would have to tell your customers that your site is located at a temporary url such as 127.441.733.14/~mysite instead of using a domain name such as mysite.com, making your site appear unprofessional and impractical.

Root Name Server
A root name server is a name server for the root zone of the Domain Name System of the Internet. It directly answers requests for records in the root zone and answers other requests by returning a list of the authoritative name servers for the appropriate top-level domain (TLD).
Root Level domain : The Domain Name System is a hierarchical naming system for computers, services, or any resource participating in the Internet. The top of that hierarchy is the root domain. The root domain does not have a formal name and its label in the DNS hierarchy is an empty string.


Top Level Domain (TLD)
A top-level domain (TLD) is the last segment of the domain name. The TLD is the letters immediately following the final dot in an Internet address.The top-level domains (TLDs) such as com, net and org are the highest level of domain names of the Internet. Top-level domains form the DNS root zone of the hierarchical Domain Name System. Every domain name ends with a top-level domain label. For Example In our website www.geekyshows.com , com is Top Level Domian.

Restricted Top Level Domains
Restricted top-level domains (rTLDs), like .aero, .biz, .edu, .mil, .museum, .name, and .pro, that require the registrant to represent a certain type of entity, or to belong to a certain community. For example, the .name TLD is reserved for individuals, and .edu is reserved for educational entities.

Country Code Top Level Domain
Country-code TLDs (ccTLDs) represent specific geographic locations. For example: .mx represents Mexico and .eu represents the European Union. Some ccTLDs have residency restrictions. For example, .eu requires registrants to live or be located in a country belonging to the European Union. Other ccTLDs, like the ccTLD .it representing Italy, allow anyone to register them, but require a trustee service if the registrant is not located in a specified country or region. Finally, there are ccTLDs that can be registered by anyone — .co representing Colombia, for example, has no residency requirements at all.

Second-level domains (SLD)
A second-level domain (SLD) is the portion of the domain name that is located immediately to the left of the dot and domain name extension. You define the SLD when you register a domain name.
Example 1: The SLD in mysite.com is mysite. 
Example 2: The SLD in mysite.co.uk is still mysite.

Country code second level domains (ccSLD)
A country code second-level domain (ccSLD) is a domain name class that many country code top-level domain (ccTLD) registries implement. The ccSLD portion of the domain name is located between the ccTLD and the SLD. Example: The ccSLD in coolexample.co.uk is .co.

What is SubDomain Name
Subdomains are a smaller part of a larger domain. For example I have a Website www.geekyshows.com If i create a sub domain at www.geekyshows.com it will be look like this help.geekyshows.com . Here help is a subdomain.

Example – www.geekyshows.com, Example – help.geekyshows.com
DNS Hierarchy
Example Domain
Root level Domain
.
Top Level Domain
.com
Second Level Domain
geekyshows
Sub Domain
help

How Domain Names are Assigned
The Internet Corporation for Assigned Names and Numbers (ICANN) is the ultimate authority for domain-name assignments. ICANN conveys authority to (accredits) Registrars throughout the world to register second-level domains within specific top-level domains; this ensures that all domain names are unique.

What is Domain Name System (DNS)?
DNS is a protocol within the set of standards for how computers exchange data on the Internet and on many private networks, known as the TCP/IP protocol suite. Its basic job is to turn a user-friendly domain name like "geekyshows.com" into an Internet Protocol (IP) address like 70.44.241.54 that computers use to identify each other on the network.

How Domain Name Work ?
After Registering a Domain name the domain name must have a hosted website that includes a numeric address, called an IP address, for visitors to access the website using your domain name.
Your domain name and its associated IP address are stored in a common database along with every other domain and associated IP address that are accessible via the Internet.
When visitors enter your domain name into a Web browser, the browser request uses your domain name to find the domain name's associated IP address and, therefore, the website. People use domain names instead of IP addresses because it is easier to remember a name rather than a series of numbers.


Like it ? Share it.

Tuesday, June 24, 2014

Introduction Burp Suite Part IV (Intruder Tab)


Burp Intruder is a tool for automating customized attacks against web applications. It is extremely powerful and configurable, and can be used to perform a huge range of tasks, from simple brute-force guessing of web directories through to active exploitation of complex blind SQL injection vulnerabilities.

How Intruder Works
Burp Intruder works by taking an HTTP request (called the "base request"), modifying the request in various systematic ways, issuing each modified version of the request, and analyzing the application's responses to identify interesting features.
For each attack, you must specify one or more sets of payloads, and the positions in the base request where the payloads are to be placed. Numerous methods of generating payloads are available (including simple lists of strings, numbers, dates, brute force, bit flipping, and many others). Payloads can be placed into payload positions using different algorithms.



Attack Target
This tab is used to configure the details of the target server for the attack. The required options are:
  • Host - This is the IP address or hostname of the target server.
  • Port - This is the port number of the HTTP/S service.
  • Use HTTPS - This specifies whether SSL should be used.
The easiest way to configure these details is to select the request you want to attack anywhere within Burp, and choose the "Send to Intruder" option on the context menu. This will send the selected request to a new tab in Intruder, and will automatically populate the Target and Positions tabs.
(Click image for large view)

Positions
Payload Positions
This tab is used to configure the request template for the attack, together with payload markers, and the attack type (which determines the way in which payloads are assigned to payload positions).

Attack Type
 Burp Intruder supports various attack types - These determine the way in which payloads are assigned to payload positions. The attack type can be selected using the drop-down above the request template editor. The following attack types are available: 
  • Sniper - This uses a single set of payloads. It targets each payload position in turn, and places each payload into that position in turn. Positions that are not targeted for a given request are not affected - the position markers are removed and any enclosed text that appears between them in the template remains unchanged. This attack type is useful for fuzzing a number of request parameters individually for common vulnerabilities. The total number of requests generated in the attack is the product of the number of positions and the number of payloads in the payload set.
  • Battering ram - This uses a single set of payloads. It iterates through the payloads, and places the same payload into all of the defined payload positions at once. This attack type is useful where an attack requires the same input to be inserted in multiple places within the request (e.g. a username within a Cookie and a body parameter). The total number of requests generated in the attack is the number of payloads in the payload set.
  • Pitchfork - This uses multiple payload sets. There is a different payload set for each defined position (up to a maximum of 20). The attack iterates through all payload sets simultaneously, and places one payload into each defined position. In other words, the first request will place the first payload from payload set 1 into position 1 and the first payload from payload set 2 into position 2; the second request will place the second payload from payload set 1 into position 1 and the second payload from payload set 2 into position 2, etc. This attack type is useful where an attack requires different but related input to be inserted in multiple places within the request (e.g. a username in one parameter, and a known ID number corresponding to that username in another parameter). The total number of requests generated in the attack is the number of payloads in the smallest payload set.
  • Cluster bomb - This uses multiple payload sets. There is a different payload set for each defined position (up to a maximum of 20). The attack iterates through each payload set in turn, so that all permutations of payload combinations are tested. I.e., if there are two payload positions, the attack will place the first payload from payload set 2 into position 2, and iterate through all the payloads in payload set 1 in position 1; it will then place the second payload from payload set 2 into position 2, and iterate through all the payloads in payload set 1 in position 1. This attack type is useful where an attack requires different and unrelated or unknown input to be inserted in multiple places within the request (e.g. when guessing credentials, a username in one parameter, and a password in another parameter). The total number of requests generated in the attack is the product of the number of payloads in all defined payload sets - this may be extremely large.
You can modify the default payload markers using the buttons next to the request template editor: 
  • Add § - If no text is selected, this inserts a single payload marker at the cursor position. If you have selected some text, a pair of markers are inserted enclosing the selected text.
  • Clear § - This removes all position markers, either from the entire template or from the selected portion of the template.
  • Auto § - This makes a guess as to where it might be useful to position payloads and places payload markers accordingly. This is useful to quickly mark positions suitable for fuzzing, but manual positioning is required for more customized attacks. If you have selected some text, markers are placed within the selected text only; otherwise, they are placed throughout the whole request template. The automatic placement of markers places payloads into the value of various types of request parameter, including:
                  a. URL query string parameters
                  b. Body parameters
                  c. Cookies
                  d. Multipart parameter attributes (e.g. the filename in file uploads)
                  e. XML data and element attributes
                  f. JSON parameters
You can configure whether the automatic payload positions will replace or append to the existing parameter values, via an option on the Intruder menu. Note that if a sub-portion of the request, but not the whole message body, contains data formatted using XML or JSON, you can automatically position payloads within this structure by manually selecting the exact block of formatted data, and using the "Auto" button to position payloads within it. This is useful, for example, when a multipart parameter value contains data in XML or JSON format.
  • Refresh - This refreshes the syntax colorizing of the request template editor, if necessary.
  • Clear - This deletes the entire request template.
Note: You can also use Intruder's payload positions UI to configure custom insertion points for active scans by Burp Scanner. To do this, configure the request template and payload markers in the usual way within Intruder, and then select "Actively scan defined insertion points" from the Intruder menu.

Payloads
This tab is used to configure one or more payload sets. The number of payload sets depends on the attack type defined in the Positions tab. For many common tasks, such as fuzzing parameters, brute force guessing a user's password, or cycling through page identifiers, only a single payload set is needed.

The configuration steps needed to configure a payload set are as follows:

Payload set - Select if you wish to configure from the drop-down list.
Payload type - Select If you want to use from the drop-down list. A large number of payload types are available, and these are highly configurable, allowing you to quickly automate the generation of payloads for virtually any situation:
  • Simple list
  • Runtime file
  • Custom iterator
  • Character substitution
  • Case modification
  • Recursive grep
  • Illegal Unicode
  • Character blocks
  • Numbers
  • Dates
  • Brute forcer
  • Null payloads
  • Character frobber
  • Bit flipper
  • Username generator
  • ECB block shuffler
  • Extension-generated
  • Copy other payload
Payload Processing
The payloads generated by the configured payload type can be further manipulated using various payload processing rules and payload encoding.

Payload Processing Rules
 You can define rules to perform various processing tasks on each payload before it is used. The defined rules are executed in sequence, and can be toggled on and off to help debug any problems with the configuration. Payload processing rules are useful in many kinds of situation where you need to generate unusual payloads, or need to wrap payloads up within a wider structure or encoding scheme prior to use.

The following types of rule are available:
  • Add prefix - This adds a literal prefix before the payload.
  • Add suffix - This adds a literal suffix after the payload.
  • Match / replace - This replaces any parts of the payload that match a specific regular expression, with a literal string.
  • Substring - This extracts a sub-portion of the payloads, starting from a specified offset (0-indexed) and up to a specified length.
  • Reverse substring - This functions as for the substring rule, but the end offset is specified counting backwards from the end of the payload, and the length is counted backwards from the end offset.
  • Modify case - This modifies the case of the payload, if applicable. The same options are available as for the case modification payload type.
  • Encode - This encodes the payload using various schemes: URL, HTML, Base64, ASCII hex or constructed strings for various platforms.
  • Decode - This decodes the payload using various schemes: URL, HTML, Base64 or ASCII hex.
  • Hash - This carries out a hashing operation on the payload.
  • Add raw payload - This adds the raw payload value before or after the current processed value. It can be useful, for example, if you need to submit the same payload in both raw and hashed form.
  • Skip if matches regex - This checks whether the current processed value matches a specified regular expression, and if so, skips the payload and moves onto the next one. This can be useful, for example, if you know that a parameter value must have a minimum length and want to skip any values in a list that are shorter than this length.
  • Invoke Burp extension - This invokes a Burp extension to process the payloads. The extension must have registered an Intruder payload processor. You can select the required processor from the list of available processors that have been registered by currently loaded extensions.
Payload Encoding
 You can configure which characters within the payload should be URL-encoded for safe transmission within HTTP requests. Any configured URL-encoding is applied last, after any payload processing rules have executed.
 It is recommended to use this setting for final URL-encoding, rather than a payload processing rule, because the payload grep option can be used to check responses for echoed payloads before the final URL-encoding is applied.

Options
This tab contains Intruder attack options for request headers, the request engine, attack results, grep match, grep extract, grep payloads, and redirections. You can edit these options in the main Intruder UI before launching an attack, and most settings can also be modified in the attack window when the attack is already running.

Request Headers
These settings control whether Intruder updates the configured request headers during attacks. Note that you have full control over the request headers via the request template in the payload positions tab. These options can be used to update those headers per-request in ways that are normally helpful.

The following options are available: 
  • Update Content-Length header - This option causes Intruder to add or update the Content-Length header in each request, with the correct value for the length of the HTTP body of that particular request. This feature is usually essential for attacks that insert variable-length payloads into the body of the template HTTP request. If the correct value is not specified, then the target server may return an error, may respond to an incomplete request, or may wait indefinitely for further data to be received in the request.
  • Set Connection: close - This option causes Intruder to add or update the Connection header with the value "close". In some cases (when the server does not itself return a valid Content-Length or Transfer-Encoding header), this option may allow attacks to be performed more quickly.
Request Engine
 These settings control the engine used for making HTTP requests in the Intruder attack. The following options are available: 
  • Number of threads - [Pro version] This option controls the number of concurrent requests the attack is able to make.
  • Number of retries on network failure - If a connection error or other network problem occurs, Burp will retry the request the specified number of times before giving up and moving on. Intermittent network failures are common when testing, so it is best to retry the request several times when a failure occurs.
  • Pause before retry - When retrying a failed request, Burp will wait the specified time (in milliseconds) following the failure before retrying. If the server is being overwhelmed with traffic, or an intermittent problem is occurring, it is best to wait a short time before retrying.
  • Throttle between requests - Optionally, Burp can wait a specified delay (in milliseconds) before every request. This option is useful to avoid overloading the application, or to be more stealthy. Alternatively, you can configure a variable delay (with a given start value and increment). This option can be useful to test the session timeout interval enforced by the application.
  • Start time - This option lets you configure the attack to start immediately, or after a specified delay, or to start in a paused state. These alternatives can be useful if an attack is being configured which will be executed at some future point, or saved for future use.
Careful use of these options lets you fine tune the attack engine, depending on the performance impact on the application, and on your own processing power and bandwidth. If you find that the attack is running slowly, but the application is performing well and your own CPU utilization is low, you can increase the number of threads to make your attack proceed faster. If you find that connection errors are occurring, that the application is slowing down, or that your own computer is locking up, you should reduce the thread count, and maybe increase the number of retries on network failure and the pause between retries.

Attack Results
  These settings control what information is captured in the attack results. The following options are available:
  • Store requests / responses - These options determine whether the attack will save the contents of individual requests and responses. Saving requests and responses consumes disk space in your temporary directory, but enables you to view these in full during an attack, repeat individual requests if necessary, and send them to other Burp tools.
  • Make unmodified baseline request - If this option is selected, then in addition to the configured attack requests, Burp will issue the template request with all payload positions set to their base values. This request will show as item #0 in the results table. Using this option is useful to provide a base response against which to compare the attack responses.
  • Use denial-of-service mode - If this option is selected, then the attack will issue requests as normal but will not wait to process any responses received from the server. As soon as each request is issued, the TCP connection will be closed. This function can be used to perform application-layer denial-of-service attacks against vulnerable applications, by repeatedly sending requests that initiate high-workload tasks on the server, while avoiding locking up local resources by holding sockets open waiting for the server to respond.
  • Store full payloads - If this option is selected, Burp will store the full payload values for each result. This option consumes additional memory but may be required if you want to perform certain actions at runtime, such as modifying payload grep settings, or reissuing requests with a modified request template.
Grep - Match
  These settings can be used to flag result items containing specified expressions in the response. For each item configured in the list, Burp will add a new results column containing a checkbox indicating whether the item was found in each response. You can then sort on this column (by clicking the column header) to group the matched results together.
Using this option can be very powerful in helping to analyze large sets of results, and quickly identifying interesting items. For example, in password guessing attacks, scanning for phrases such as "password incorrect" or "login successful" can locate successful logins; in testing for SQL injection vulnerabilities, scanning for messages containing "ODBC", "error", etc. can identify vulnerable parameters.

In addition to the list of expressions to match, the following options are available: 
  • Match type - This specifies whether the expressions are simple strings or regular expressions.
  • Case sensitive match - This specifies whether the check for the expression should be case sensitive.
  • Exclude HTTP headers - This specifies whether the HTTP response headers should be excluded from the check.

Grep - Extract
 These settings can be used to extract useful information from responses into the attack results table. For each item configured in the list, Burp will add a new results column containing the text that was extracted for that item. You can then sort on this column (by clicking the column header) to order the extracted data.
This option is useful for mining data from the application and can support a wide range of attacks. For example, if you are cycling through a range of document IDs, you can extract the page title of each document looking for interesting items. If you have found a function that returns details of other application users, you can iterate through user IDs and retrieve relevant fields about users looking for administrative accounts or even passwords. If a "forgotten password" function takes a username as a parameter and returns a user-configured password hint, you can run through a list of common usernames and harvest all the associated password hints, and then visually scan through the list looking for easily guessed passwords.
If the same matching item is added multiple times in succession, then each server response will be searched for multiple occurrences of that expression, and the text immediately following each occurrence will be captured. This can be useful, for example when an HTML table contains useful information but there are no unique prefixes with which to automatically pick out each item.

Grep - Payloads
  These settings can be used to flag result items containing reflections of the submitted payload. If the option is enabled, Burp will add a new results column containing a checkbox indicating whether the value of the current payload was found in each response. (If more than one payload set is used, a separate column will be added for each payload set.)
This feature can be useful in detecting cross-site scripting and other response injection vulnerabilities, which can arise when user input is dynamically inserted into the application's response.

The following options are available:
  • Case sensitive match - This specifies whether the check for the payload should be case sensitive.
  • Exclude HTTP headers - This specifies whether the HTTP response headers should be excluded from the check.
  • Match against pre-URL-encoded payloads - It is normal to configure Intruder to URL-encode payloads within requests. However, these are normally decoded by the application and echoed in their original form. You can use this option to make Burp check responses for payloads in their pre-encoded form.
Redirections
  These settings control how Burp handles redirections when performing attacks. It is often necessary to follow redirections to achieve the objectives of your attack. For example, in a password guessing attack, the result of each attempt might only be displayed by following a redirection. When fuzzing, relevant feedback might only appear in an error message that is returned after an initial redirection response.

The following options are available:

Follow redirections - This setting controls the targets of redirections that are followed. The following options are available:
  • Never - Intruder will not follow any redirections.
  • On-site only - Intruder will only follow redirections to the same web "site", i.e. to URLs employing the same host, port and protocol as was used in the original request.
  • In-scope only - Intruder will only follow redirections to URLs that are within the suite-wide target scope.
  • Always - Intruder will follow redirections to any URL whatsoever. You should use this option with caution - occasionally, web applications relay your request parameters in redirections to third-parties, and by following redirections you may inadvertently attack an application that you do not intend to.
Process cookies in redirections - If this option is selected, then any cookies set in the redirection response will be resubmitted when the redirection target is followed. For example, this option may be necessary if you are attempting to brute force a login challenge that always returns a redirection to a page indicating the login result, and a new session is created in response to each login attempt.
(Click image for large view)

Like it ? Share it.

Thursday, June 19, 2014

Self Defense Apps for Android


Submission Defense
This app was designed with one single-minded purpose: to help you tap out much less often. you can easily navigate to each individual technique or details section simply by touching a couple of buttons.  Plus with the app you also get an entire lesson on shutting down your opponent’s offence from the Black Belt Concepts Course for free.

Self-defense. (World karate)
This app helps you learn the fighting art called karate. It will teach you everything from basics to advance. It even provides the right workouts to make your body fit to learn this art.
It’s available in 9 languages and it gives you the pictures of the move so that you can have the correct posture and learn the right method. It’s priced at 122 rupees on play store.

Marine Corps Martial Arts I
This is advanced level of defense. The moves and tricks it provides are totally brilliant as people who are highly trained in this field have given the best information needed to learn these defensive methods in the most effective way possible.
This app has all the moves in the order and it helps you understand better with the help of pictures and videos. It focuses on important things like hand-to-hand combat, edged weapons and weapons of opportunity.

Bully Buster
This app is really helpful for kids to save themselves from getting bullied. It provides all the secret tactics to defend a child from getting bullied.
 It helps a kid to learn bullying basics and it also has a lot of other information like teaching a child to speak to an adult or school officials and teach them how to be confident. It’s a free app and every kid needs to learn these methods to keep him away from getting bullied.



Self Defense for Women
This is an app exclusively made for women who have to pass through the dangerous streets out there. Self defense for women teaches you all the moves you need to save yourself from the attackers.
 It focuses on basic self defense moves that you can employ to resist an attacker, ideal weapons for self defense, effective martial arts, correct posture in self defense and being alert in high-risk places.

Like it ? Share it.