Web Hacking
◾
333
Step 2
—Next, we will load the cheat sheet in burp intruder, which would be used to test the
form against.
Step 3
—Finally, we will start the intruder attack and take a note of the content length to see
where we have been able to bypass the authentication mechanism.
Dostları ilə paylaş: