Web application security - the fast guide 1.1 | Page 169

Chapter 8 - Attack Tools P a g e | 169 One of the special features in fiddler that it allows the user to write a .Net code to alter the request and response programmatically or even create a full interceptor compiled as .DLL and put it in the (Interceptors ) folder of fiddler.  Burp intruder: Java based software that allows user to iterate through several attacks based on a manually created request structure then a need to decide at when and what various attack payloads need to include. Burp Intruder offers several packaged payloads, including overflow testing payloads, fuzz testing and denial of service. While Burp represents a good tool for iteration based attacks it is not the most suitable tool when it comes to create single well-crafted request attack Figure 63:Burp Suite interface  Google rat proxy: Google had released also an interesting tool to allow application security assessment tool named Ratproxy. The tool like other proxies initiate an interceptor that will enable analyzing user activities while using the site in the background and looks for security holes. The tool uses passive mode approach to collect information and store it to log. User needs to use a parser to convert the log to html based humanly readable format. To get the parser we use: