Target Analyzer
This function can be used to analyze a target web application and tell you
how many static and dynamic URLs it contains, and how many parameters each URL
takes. This can help you assess how much effort a penetration testing engagement
is likely to involve, and can help you decide where to focus your attention
during the test itself.
To access this feature, select one or more hosts or branches within the site
map, and choose "Analyze site map" within "Engagement tools" in the context
menu.
The Target Analyzer dialog contains the following tabs:
- Summary - This shows the total number of dynamic
URLs, static URLs, parameters, and unique parameter names. It also has
an option to save all of the analysis results in an HTML-formatted
report.
- Dynamic URLs - This lists all of the URLs that
were observed to accept parameters. The preview pane shows the full
request and response for the selected item, and details of the request
parameters.
- Static URLs - This lists all of the URLs that were
not observed to take parameters. The preview pane shows the full
request and response for the selected item.
- Parameters - This lists each uniquely named
parameter, and a count of the URLs in which it appears. Selecting a
parameter displays a list of those URLs, and selecting a URL displays
the full request and response for that URL.
The following points are worth noting about the target analyzer:
- The function
only analyzes the content already captured within the site map, so you should
ensure that you have fully mapped all of the application's
content and functionality before running it.
- URLs are classified as "static"
if they have not been observed to take any parameters in the URL or message body; however the responses
from these URLs may still be dynamically generated by the application.
Wednesday, November 2, 2016
1.7.10
This release adds some new APIs that extensions can use to easily implement powerful scan checks and other logic that involves response diffing.
On Friday, to coincide with our Backslash Powered Scanning talk at Black Hat EU, we will be releasing an extension to the BApp Store that demonstrates how the new APIs can be used to create powerful new scanning capabilities.
See all release notes ›