Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Application Penetration Testing with Burp Suite

You're reading from   Hands-On Application Penetration Testing with Burp Suite Use Burp Suite and its features to inspect, detect, and exploit security vulnerabilities in your web applications

Arrow left icon
Product type Paperback
Published in Feb 2019
Publisher Packt
ISBN-13 9781788994064
Length 366 pages
Edition 1st Edition
Arrow right icon
Authors (3):
Arrow left icon
Dhruv Shah Dhruv Shah
Author Profile Icon Dhruv Shah
Dhruv Shah
Riyaz Ahemed Walikar Riyaz Ahemed Walikar
Author Profile Icon Riyaz Ahemed Walikar
Riyaz Ahemed Walikar
Carlos A. Lozano Carlos A. Lozano
Author Profile Icon Carlos A. Lozano
Carlos A. Lozano
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Configuring Burp Suite FREE CHAPTER 2. Configuring the Client and Setting Up Mobile Devices 3. Executing an Application Penetration Test 4. Exploring the Stages of an Application Penetration Test 5. Preparing for an Application Penetration Test 6. Identifying Vulnerabilities Using Burp Suite 7. Detecting Vulnerabilities Using Burp Suite 8. Exploiting Vulnerabilities Using Burp Suite - Part 1 9. Exploiting Vulnerabilities Using Burp Suite - Part 2 10. Writing Burp Suite Extensions 11. Breaking the Authentication for a Large Online Retailer 12. Exploiting and Exfiltrating Data from a Large Shipping Corporation 13. Other Books You May Enjoy

Detecting XSS vulnerabilities


XSS has three different types, but all of them have one thing in common—they derive from the input validation error to manage characters that are used to inject JavaScript code or HTML tags. So, we can use some inputs as shown in the following screenshot (which is a cheat sheet from the OWASP project), and add to the Intruder tool as payload:

A cheat sheet from the OWASP project

The way to detect XSS vulnerabilities is to find these codes without encoding or modifications in the responded HTML or that we did not get an error after injecting the testing strings.

To add the cheat sheet, use a similar process to adding the payload list to Intruder. Open the Intruder tool, click on the Payloads tab, and then select the Load button. Finally, mark all the parameters that you think are vulnerable, then click on Start attack, as shown in the following screenshot:

List of vulnerable parameters

In the preceding screenshot, we can see how all the strings were launched by Intruder...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image