Skip to main content

Intruder - Sniper Attack

Purpose: The Sniper attack type is designed to test one input position at a time, allowing you to see how a single variable affects the outcome of a request. This is particularly useful for brute-force attacks on parameters like usernames, passwords, session tokens, etc.

How It Works:

  • Single Position Testing: In a Sniper attack, you identify a single position in your request where the payloads will be inserted one by one. Each request only varies by this one position.

  • Payload Iteration: Burp Suite will go through the list of payloads you provide and substitute them at the designated position, sending a new HTTP request for each payload.

Steps:

1.Capture the Request:

  • Use Burp Suite’s Proxy tab to intercept the login request.

  • For example, the intercepted HTTP POST request might look like this :

                                       POST /example?p1=p1val&p2=p2val HTTP/1.0

                                       Cookie: c=cval

                                       Content-Length: 17

                                        p3=p3val&p4=p4val

2.Set the Position:

  • Go to the Intruder tab and add the intercepted request.

  • Highlight the p3 parameter and click "Add §" to set it as a variable position.

  • Highlight the p4 parameter and click "Add §" to set it as a variable position.

  • The request will now look like this in the Positions tab:


3.Configure Payloads:

  • In the Payloads tab, choose a list of common passwords to brute-force (e.g.123, 234, 345).

  • Load these passwords into the payload list.


4.Start the Attack:

  • Click "Start Attack" to begin the Sniper attack.

  • Burp Suite will iterate through each password, replacing the p3 & p4 parameter in the request and sending it to the server.

Result Analysis: After the attack is completed, review the results to identify the correct password by looking for a different HTTP response status code, length, or other response details indicating a successful login.




Conclusion: The Sniper attack is ideal for scenarios where you need to focus on a single input parameter, testing how different values impact the behavior of the web application. It’s a straightforward approach for tasks like brute-forcing passwords or session tokens. The simplicity and focus of the Sniper attack make it an essential tool for precise testing when only one variable needs to be manipulated at a time.


Comments

Popular posts from this blog

OWASP Top 10 : Understanding Broken Access Control

What is broken access control? Broken access control is a security issue where users can access data or perform actions that they shouldn't be allowed to. This happens when the system fails to properly enforce rules about what users can and cannot do. Types of access controls :  1 . Vertical privilege escalation:  Vertical privilege escalation happens when a normal user gains access to functionalities reserved for higher-privileged users. Example:  A normal user can change the policies of the company.  2. Horizontal privilege escalation:  Horizontal privilege escalation allows a user to switch their access to another user's account, essentially impersonating them. Example:  A normal user can switch their account to admin.  3 . Insecure direct object reference ( IDOR):  IDOR occurs when an application exposes a reference to an internal implementation object, such as a file, directory, or database key. Example:  Suppose...

Intruder - Battering Ram Attack

Purpose:  The Battering Ram attack type is used when you need to insert the same payload into multiple positions within the same request. This can be useful in scenarios where multiple fields might share the same value or where you want to test how the application handles identical inputs across different parameters. How It Works: Multiple Position Synchronization:  In a Battering Ram attack, the same payload is simultaneously inserted into all the designated positions within the request. Synchronized Input Testing:  This type of attack is beneficial for testing inputs that are expected to be the same or related across different fields. Steps: 1.Capture the Request: Use Burp Suite’s Proxy tab to intercept the login request. For example, the intercepted HTTP POST request might look like this :                                       ...

Intruder - Pitchfork Attack

Purpose:  The Pitchfork attack type allows you to test multiple parameters with different payloads simultaneously. It’s ideal for scenarios where you want to test how different combinations of inputs interact with each other. How It Works: Parallel Payload Insertion:  In a Pitchfork attack, Burp Suite inserts different payloads from multiple lists into multiple positions. Each position gets its unique payload. Combinatorial Testing:  This method is effective when you suspect that specific combinations of inputs might trigger unique responses or vulnerabilities. Steps: 1.Capture the Request: Use Burp Suite’s Proxy tab to intercept the login request. For example, the intercepted HTTP POST request might look like this :                                        POST /example?p1=p1val&p2=p2val HTTP/1.0      ...