Black Hat Python Python Programming for Hackers and Pentesters by Unknown

Black Hat Python Python Programming for Hackers and Pentesters by Unknown

Author:Unknown
Language: eng
Format: epub


Figure 6-13. Sending the requests to the BHP Wordlist extension

Now check the output tab of the extension. In practice, we’d save its output to a file, but for

demonstration purposes we display the wordlist in Burp, as shown in Figure 6-14.

You can now feed this list back into Burp Intruder to perform the actual password-guessing

attack.

Figure 6-14. A password list based on content from the target website

We have now demonstrated a small subset of the Burp API, including being able to generate our

own attack payloads as well as building extensions that interact with the Burp UI. During a

penetration test you will often come up against specific problems or automation needs, and the

Burp Extender API provides an excellent interface to code your way out of a corner, or at least

save you from having to continually copy and paste captured data from Burp to another tool.

In this chapter, we showed you how to build an excellent reconnaissance tool to add to your Burp

tool belt. As is, this extension only retrieves the top 20 results from Bing, so as homework you

could work on making additional requests to ensure that you retrieve all of the results. This will

require doing a bit of reading about the Bing API and writing some code to handle the larger

results set. You of course could then tell the Burp spider to crawl each of the new sites you

discover and automatically hunt for vulnerabilities!

[13] Visit http://www.bing.com/dev/en-us/dev-center/ to get set up with your own free Bing API key.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(55908)
What's Done in Darkness by Kayla Perrin(26521)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19007)
The Fifty Shades Trilogy & Grey by E L James(18959)
Shot Through the Heart by Mercy Celeste(18879)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(16982)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(16875)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(16804)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16698)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16322)
The Subtle Art of Not Giving a F*ck by Mark Manson(14261)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14072)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(13420)
Scorched Earth by Nick Kyme(12715)
Drei Generationen auf dem Jakobsweg by Stein Pia(10922)
Suna by Ziefle Pia(10846)
Scythe by Neal Shusterman(10270)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(9476)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(9316)
This is Going to Hurt by Adam Kay(9098)