Microsoft has created a forensics tool for Mikrotik devices. Use it to search for suspicious properties and weak security points that need to be fixed on the router. This tool’s functionalities include the following:
If you use the BurpSuite toolkit - for AppSec.
1) Autorize https://portswigger.net/bappstore/f9bbac8c4acf4aefa4d7dc92a991af2f Autorize is an extension aimed at helping the penetration tester to detect authorization vulnerabilities, one of the more time-consuming tasks in a web application penetration test. It is sufficient to give to the extension the cookies of a low privileged user and navigate the website with a high privileged user. The extension automatically repeats every request with the session of the low privileged user and detects authorization vulnerabilities. It is also possible to repeat every request without any cookies in order to detect authentication vulnerabilities in addition to authorization ones. The plugin works without any configuration, but is also highly customizable, allowing configuration of the granularity of the authorization enforcement conditions and also which requests the plugin must test and which not. It is possible to save the state of the plugin and to export a report of the authorization tests in HTML or in CSV. The reported enforcement statuses are the following: Bypassed! - Red color Enforced! - Green color Is enforced??? (please configure enforcement detector) - Yellow color 2) AuthMatrix https://portswigger.net/bappstore/30d8ee9f40c041b0bfec67441aad158e AuthMatrix is an extension to Burp Suite that provides a simple way to test authorization in web applications and web services. With AuthMatrix, testers focus on thoroughly defining tables of users, roles, and requests for their specific target application upfront. These tables are displayed through the UI in a similar format to that of an access control matrix commonly built in various threat modeling methodologies. Once the tables have been assembled, testers can use the simple click-to-run interface to efficiently run all combinations of roles and requests. Testers can then confirm their results with an easy to read, color-coded interface indicating any authorization vulnerabilities detected in the system. Additionally, the extension provides the ability to save and load target configurations for simple regression testing. Requires Jython version 2.7.0 or later Version 0.8 release information: https://zuxsecurity.blogspot.com/2018/01/authmatrix-08.html 3) AutoRepeater https://portswigger.net/bappstore/f89f2837c22c4ab4b772f31522647ed8 This extension automatically repeats requests, with replacement rules and response diffing. It provides a general-purpose solution for streamlining authorization testing within web applications. AutoRepeater provides the following features: Automatically duplicate, modify, and resend any request Conditional replacements Quick header, cookie, and parameter value replacements Split request/response viewer Original vs. modified request/response diff viewer Highilight logs Filter logs Base replacements for values that break requests like CSRF tokens and session cookies Renamable tabs Logging Exporting Toggled activation "Send to AutoRepeater" from other Burp Suite tools 4) Auth Analyzer https://portswigger.net/bappstore/7db49799266c4f85866f54d9eab82c89 The Burp extension helps you to find authorization bugs. Just navigate through the web application with a high privileged user and let the Auth Analyzer repeat your requests for any defined non-privileged user. With the possibility to define Parameters the Auth Analyzer is able to extract and replace parameter values automatically. With this for instance, CSRF tokens or even whole session characteristics can be auto extracted from responses and replaced in further requests. Each response will be analyzed and tagged on its bypass status. Main Features Automated Request Repeating Automated Header and Parameter Replacement Automated Parameter Value Extraction (e.g. Session Cookie or CSRF Token) Automated Header and Parameter removement Automated Bypass Analysis Detailed Processing Filters User Friendly Request / Response Comparison View Save and Export Functionality 5). Authz https://portswigger.net/bappstore/4316cc18ac5f434884b2089831c7d19e This extension can be used to help test for authorization vulnerabilities. Usage: Right click on an item, and choose "Send request(s) to Authz". Create a modified cookie, generally for a different user. Click "Run". Identify any differences in responses. 6). Multi Session Replay https://portswigger.net/bappstore/47319d00cae2447e8319db423913e19c This extension allows replay of requests in multiple sessions. Its main purpose is to aid in searching for Privilege Escalation issues. Instructions: Add requests from HTTP History or Site map by choosing "Send to Replay" from the context menu. Define any number of modifications by adding them to the modifications table. They will be applied to the base requests ("Original" tab). Four types of modifications are available: header, cookie, GET and POST. You can define a session in any Request/Response Editor within Burp by selecting text (e.g. "SESSIONID=sessionid") and choosing "Define replay session" from the context menu. The session will be added to the Sessions table and can be applied as a modification with "Apply" button. Details tabs on the right hand side show the original set of requests (base requests) and each replay round in numbered tabs. You can compare responses manually or use Burp Comparer. find the community edition of BurpSuite here |
Author: <see article>
These links serve as tributes to those who have written them. Please find contributor details in the links provided Archives
April 2024
Categories |