👾
Rootkid - Cyber Journal
Portfolio
  • 👩‍🚀Introduction
    • 🤖About Cyber Journal & Rootkid
    • 📜License Agreement
    • ⚠️Disclaimer
  • 📚Exam Prep Notes
    • 🗒️KLCP Exam (PEN-103) - Notes
      • 1. Linux Fundamentals
      • 2. Introduction
      • 3. About Kali Linux
      • 4. Getting Started with Kali Linux
      • 5. Installing Kali Linux
      • 6. Configuring Kali Linux
      • 7. Helping Yourself and Getting Help
      • 8. Securing and Monitoring Kali Linux
      • 9. Debian Package Management
      • 10. Advanced Usage
      • 11. Kali Linux in the Enterprise
      • 12. Introduction to Security Assessments
      • 13. Conclusion: The Road Ahead
    • 📒ISO/IEC 27001:2022 Lead Auditor - Notes
      • ISO - Training - Day - 1
      • ISO - Training - Day - 2
      • ISO - Training - Day - 3
      • ISO - Training - Day - 4
      • Practice Questions - Notes
      • Other PDF References
    • 📑Junior Penetration Tester (eJPTv2) - Notes
      • 💡Assessment Methodologies
        • 🔍Information Gathering
          • 🌏Passive Information Gathering
          • 🧐Active Information Gathering
        • 👣Footprinting & Scanning
          • 🗺️Mapping a Network
          • 🎛️Port Scanning
        • 🕵️Enumeration
          • 📜SMB Enumeration
          • 📂FTP Enumeration
          • 🐚SSH Enumeration
          • 🕸️HTTP Enumeration
          • 🗄️MySQL & MSSQL Enumeration
        • 🐛Vulnerability Assessment
          • 🩸Case Study: Heartbleed Vulnerability (CVE-2014-0160)
          • 🔵Case Study: EternalBlue Vulnerability (CVE-2017-0143)
          • 👨‍💻Case Study: Log4J Vulnerability (CVE-2021-44228)
      • 🧰Assessment Methodologies: Auditing Fundamentals
      • 📶Host & Network Penetration Testing
        • 💻System/Host Based Attacks
          • 🪟Overview Of Windows Vulnerabilities
          • 💣Exploiting Windows Vulnerabilities
            • 🧨Exploiting Microsoft IIS WebDAV
            • 🧨Exploiting WebDAV With Metasploit
            • 🧨Exploiting SMB With PsExec
            • 🧨Exploiting Windows MS17-010 SMB Vulnerability (EternalBlue)
            • 🧨Exploiting RDP - Brute Force
            • 🧨Exploiting Windows CVE-2019-0708 RDP Vulnerability (BlueKeep)
            • 🧨Exploiting WinRM
          • 📈Windows Privilege Escalation
            • 🔥Windows Kernel Exploits
            • 🔥Bypassing UAC With UACMe
            • 🔥Access Token Impersonation
          • 🗃️Windows File System Vulnerability - Alternate Data Streams
          • 💳Windows Credential Dumping
            • 🔑Searching For Passwords In Windows Configuration Files
            • 🔑Dumping Hashes With Mimikatz
            • 🔑Pass-The-Hash Attacks
          • 💎Linux Vulnerabilities
          • 🎰Exploiting Linux Vulnerabilities
            • 🐚Exploiting Bash CVE-2014-6271 Vulnerability (Shellshock)
            • 🗄️Exploiting FTP - Linux
            • 🔐Exploiting SSH - Linux
            • 📭Exploiting SAMBA - Linux
          • ‼️Linux Privilege Escalation
            • 💥Linux Kernel Exploits
            • 💥Exploiting Misconfigured Cron Jobs
            • 💥Exploiting SUID Binaries
          • 🔐Linux Credential Dumping
        • 📶Network-Based Attacks
          • 📦Tshark & Filtering Basics
          • 🕷️Arp Poisoning
        • 💣The Metasploit Framework (MSF)
        • 💥Exploitation
          • 🖲️Vulnerability Scanning
          • ⚠️Searching For Exploits
          • 🐚Bind & Reverse Shells
          • 👾Exploitation Frameworks
          • 🪟Windows Exploitation
          • 🥌Linux Exploitation
          • ☣️AV Evasion & Obfuscation
        • 🚩Post-Exploitation
          • 🌬️Windows Local Enumeration
          • 📟Linux Local Enumeration
          • 🚜Transferring Files To Windows & Linux Targets
          • 🔼Upgrading Shells
          • 👀Windows Privilege Escalation
          • ⚒️Linux Privilege Escalation
          • 🔮Windows Persistence
          • 🧙Linux Persistence
          • 〰️Dumping & Cracking Windows Hashes (NTLM Hashes)
          • 🍘Dumping & Cracking Linux Password Hashes
          • ➿Pivoting Overview
          • 🧹Clearing Your Tracks On Windows & Linux
        • 🧑‍🔬Social Engineering Fundamentals
      • 🕸️Web Application Penetration Testing
        • ℹ️Intro to Web
        • 🎯Directory Enumeration
        • 🧰BurpSuite and ZAP-Proxy Overview
        • 🛠️Nikto, SQLMap, XSSer & Hydra Overview
      • 👽Extra Resources
        • ➕CIDR Conversion Table
        • 📦Machines or Lab Solved to Practice
    • 📓Certified in Cybersecurity - (ISC)2 - Notes
      • 📝Chapter-1 Security Controls - Notes
      • 📝Chapter-2 Incident Response, Business Continuity & Disaster Recovery - Notes
      • 📝Chapter 3: Access Control Concepts - Notes
      • 📝Chapter 4: Network Security - Notes
      • 📝Chapter 5: Security Operations - Notes
    • 📕Certified Ethical Hacker v12 - Practical - Notes
      • 👣Module 02: Footprinting and Reconnaissance
      • 🔎Module 03: Enumeration
      • Module 04: Scanning Networks
      • Module 05: Vulnerability Analysis
      • 💻Module 06: System Hacking
      • 🐛Module 07: Malware Threats
      • 🧙Module 08: Sniffing
      • 🐧Module 09: Social Engineering
      • ⚠️Module 10: Denial-of-Service
      • 🪝Module 11: Session Hijacking
      • Module 12: Evading IDS, Firewalls, and Honeypots
      • 🗄️Module 13: Hacking Web Servers
      • Module 14: Hacking Web Applications
      • 💉Module 15: SQL Injection
      • Module 16: Hacking Wireless Networks
      • Module 17: Hacking Mobile Platforms
      • Module 18: IoT and OT Hacking
      • Module 19: Cloud Computing
      • Module 20: Cryptography
      • Extra Resources
        • 📚Helpful Resources
        • 📜Cheat Sheet
  • ✍️Blogs
    • Mastering the Art of Logic Flaws: Unraveling Cyber Mysteries !!!
    • How to write a Detailed Vulnerability Report
    • Payment Gateway Bypass on Government Domain.
Powered by GitBook
On this page
  • BurpSuite
  • Usage:
  • Functionality:
  • ZAP Proxy
  • Usage:
  • Functionality:

Was this helpful?

  1. Exam Prep Notes
  2. Junior Penetration Tester (eJPTv2) - Notes
  3. Web Application Penetration Testing

BurpSuite and ZAP-Proxy Overview

BurpSuite

Burp Suite is a powerful tool used to find and fix security vulnerabilities in web applications. It's like a digital detective that helps you search for weaknesses in websites and web services. Burp Suite is widely used by cybersecurity professionals to make the internet safer.

How it works: Imagine a website is like a big building with many rooms. Burp Suite helps you go through every nook and cranny of that building to see if there are any hidden doors or weak locks. These hidden doors are like security holes that hackers could use to break in. Burp Suite also checks if the locks are strong enough to keep hackers out.

Usage:

  1. Spidering: Burp Suite acts like a spider that crawls through the website's pages, finding all the different paths and links. This helps ensure no part of the site is overlooked.

  2. Scanning for Vulnerabilities: It checks for common security issues like weak passwords, secret information that's not well protected, and places where hackers might sneak in malicious code.

  3. Intercepting Traffic: Burp Suite can eavesdrop on the communication between your browser and the website. This helps you see what information is being exchanged and if any of it is not properly encrypted.

  4. Fuzzing: This is like trying lots of different keys in a lock to see if any of them fit. Burp Suite tries different inputs in web forms and URLs to see if it can cause unexpected behavior.

  5. Reporting: After investigating, Burp Suite gives you a report that lists all the security issues it found. This helps developers fix the problems and make the website safer.

Functionality:

  1. Proxy: Burp Suite can sit in the middle of your computer and the website, allowing you to see and modify the data that goes back and forth. This helps in understanding how things work and spotting potential issues.

  2. Scanner: It's like an automatic detective that looks for common mistakes or vulnerabilities in the website's code and configuration.

  3. Intruder: This tool helps test how the website reacts to different inputs, almost like a hacker trying to break in by trying various combinations.

  4. Repeater: Burp Suite can repeat a specific request to the website multiple times, making it useful for testing how the site responds under different conditions.

  5. Sequencer: This tool helps analyze the randomness of data, which can be important for encryption and security.

  6. Decoder: It can help you understand and transform encoded or encrypted data into a readable format.

ZAP Proxy

ZAP Proxy, also known as OWASP Zed Attack Proxy, is a tool that helps find and fix security issues in web applications. It's like a digital inspector that searches for vulnerabilities so developers can make their websites safer. Here's how it works and what it does, explained in simple terms and technical details:

How it Works: Think of ZAP Proxy as a friendly hacker that you invite to your website. It sits between your browser and the website, analyzing the communication. It looks for any weak points where bad guys could sneak in. This way, you can find problems before the real bad guys do.

Usage:

  1. Spidering: ZAP Proxy crawls through the website, exploring every corner and noting down all the pages. This helps ensure that no part of the website is overlooked.

  2. Active Scanning: It acts like a security investigator, trying to find vulnerabilities by sending special requests to the website. It then checks if the website reacts in a way that could be exploited by attackers.

  3. Passive Scanning: Just like a silent observer, ZAP Proxy watches the communication between your browser and the website. It can identify sensitive information that's being sent without proper protection.

  4. Fuzzer: This tool tests the website's ability to handle unexpected or strange inputs. It sends all sorts of weird data to see if the site can handle it without crashing or revealing sensitive information.

  5. Authentication Testing: ZAP Proxy can try different passwords and usernames to see if it can sneak into restricted parts of the website. This helps find weak passwords or holes in security.

Functionality:

  1. Proxy Mode: ZAP Proxy sits in the middle of your computer and the website, allowing you to see and modify the data that goes back and forth. This is useful for understanding how things work and finding potential problems.

  2. Spider: This tool explores the website like a spider, making sure it covers every part of it. It's essential to ensure that no hidden or forgotten pages are left unchecked.

  3. Scanner: ZAP Proxy searches for vulnerabilities in the website's code and settings. It's like a detective searching for weak spots where attackers could break in.

  4. Fuzzer: The fuzzer tests the website by sending different types of input to see how it responds. It's like trying all sorts of keys in a lock to see which one opens it.

  5. Active and Passive Mode: ZAP Proxy can actively test the website by interacting with it or passively observe the data flowing between your browser and the site.

  6. Automated Reports: After its investigation, ZAP Proxy gives you a report detailing all the security issues it found. This helps developers understand the problems and fix them. </aside>




Hacker's Mantra:Hackers: the ones who find beauty in complexity.

PreviousDirectory EnumerationNextNikto, SQLMap, XSSer & Hydra Overview

Last updated 10 months ago

Was this helpful?

📚
📑
🕸️
🧰