20 - Web Application Security Testing Using Burp Suite (Compatibility Mode) PDF
20 - Web Application Security Testing Using Burp Suite (Compatibility Mode) PDF
Introduction
Approach
Challenges Faced
Benefits
Conclusion
1) Heartland Payment Systems- In Mar 2008 – 138 million credit cards exposed
through SQL injection to install spyware on Heartland's data systems.
2) TJX Companies Inc. – In Dec 2006- 94 million credit cards exposed
3) Epsilon- In Mar 2011- Exposed names and e-mails of millions of customers
stored in more than 108 retail stores plus several huge financial firms like
CitiGroup Inc. and the non-profit educational organization, College Board.
The OWASP Top Ten provides a powerful awareness document for web
application security.
The OWASP Top Ten represents a broad consensus about what the most
critical web application security flaws are.
A1: Injection
A2: Cross-Site Scripting (XSS)
A3: Broken Authentication and Session Management
A4: Insecure Direct Object References
A5: Cross-Site Request Forgery (CSRF)
A6: Security Misconfiguration
A7: Insecure Cryptographic Storage
A8: Failure to Restrict URL Access
A9: Insufficient Transport Layer Protection
A10: Unvalidated Redirects and Forwards
Local listener port - This is the port on the local computer which will be
opened to listen for incoming connections. Browser settings should be
configured to use the host 127.0.0.1 and the Port 8080 as its proxy
server.
BURP needs to be configured now so that it can accept the request from
browser and from there on it can become a browser for the server
BURP Configuration
Click on options tab and just consider the three sections, rest all sections be
as it is with there default settings
Do www authentication (used for intranet application)
Upstream proxy server (used for internet application)
Use client SSL certificate (PKCS12)
11 © 2012 WIPRO LTD | WWW.WIPRO.COM | CONFIDENTIAL
Intranet Application Settings:
Method 1: Check the do www authentication check box and add the
server details where application is hosted, type of authentication (basic,
NTLM or digest. This can be directly asked to development team or hit
and trial can be done as there are only three options available),
username, password and domain
Method 2: Check the do www authentication check box and check the
prompt for credentials on authentication failure checkbox too, by doing
so no need to enter the above details, these details can be entered while
you start running the application viaburp
Burp Proxy:
When Burp has been configured to become a browsers proxy, it will capture
and replay any and all web requests. By default, Burp will intercept the web
request and wait for approval/modification before passing it on to the internet.
This type of control can allow a person to dynamically change variables to
see what happens.
Burp Proxy allows you to define multiple listeners. Each listener opens a
port on your computer and waits for connections from your browser. By
default, Burp opens a single listener on port 8080 of the loopback interface,
but you can modify this listener and add as many others as you require