How to do it...

  1. Switch to the Burp Extender tab. Go to the BApp Store and find the plugin labeled Manual Scan Issues. Click the Install button:

  1. Return to the Firefox browser and browse to the Mutillidae homepage.
  2. Switch to the Burp ProxyHTTP history tab and find the request you just made browsing to the homepage. Click the Response tab. Note the overly verbose Server header indicating the web server type and version along with the operating system and programming language used. This information can be used by an attacker to fingerprint the technology stack and identify vulnerabilities that can be exploited:

  1. Since this is a finding, we need to create a new issue manually to capture it for our report. While viewing the Request, right-click and select Add Issue, as follows:

  1. A pop-up dialog box appears. Within the General tab, we can create a new issue name of Information Leakage in Server Response. Obviously, you may add more verbiage around the issue detail, background, and remediation areas, as follows:

  1. If we flip to the HTTP Request tab, we can copy and paste into the text area the contents of the Request tab found within the message editor, as follows:

  1. If we flip to the HTTP Response tab, we can copy and paste into the text area the contents of the Response tab found within the message editor.
  2. Once completed, flip back to the General tab and click the Import Finding button. You should see the newly-created scan issue added to the Issues window, as follows:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.189.188.238