-
Book Overview & Buying
-
Table Of Contents
The Web Application Hacker's Handbook
By :
The JAttack tool consists of fewer than 250 lines of simple code, yet in a few seconds, it uncovered at least two potentially serious security vulnerabilities while fuzzing a single request to an application.
Nevertheless, despite its power, as soon as you start to use a tool such as JAttack to deliver automated customized attacks, you will quickly identify additional functionality that would make it even more helpful. As it stands, you need to configure every targeted request within the tool's source code and then recompile it. It would be better to read this information from a configuration file and dynamically construct the attack at runtime. In fact, it would be much better to have a nice user interface that lets you configure each of the attacks described in a few seconds.
There are many situations in which you need more flexibility in how payloads are generated, requiring many more advanced payload sources than the ones we have created...
Change the font size
Change margin width
Change background colour