Advanced_Task2_Practical
Advanced_Task2_Practical
Advanced_Task2_Practical
Report
INTRODUCTION
NMAP:
Using –
NMAP allows
us to scan for
UDP ports only
using –sU
option
BURPSUITE
With the Burp Intruder, you can test for a wide range of vulnerabilities. This
includes SQL injection, cross-site scripting (XSS), and directory traversal. The
intruder is highly flexible, allowing us to customize our attacks.
INTRUDER - PAYLOAD
We can also use the intruder to perform specific audits such as brute-forcing,
dictionary attacks, and fuzzing. The Intruder also lets us target specific areas of
the application by selecting custom parameters.
Under Intruder Tab, In Payloads section, we can provide a word list for
extracting the passwords, each fuzzed value required individual payload.
WIRESHARK
Wireshark is a widely-used network protocol analyser that captures packets from network
connections. Here are its key benefits:
Filer by
protocol http
Filter by TCP
Protocol for
Port 80.
Filter by
Source or
Destination IP
address
By clicking on
any packet we
get Individual
Packet Details.
Filter by
Source IP
address.
Filter by
Destination IP
address.
Combine IP
Source or
Destination
address and TCP
Port value.
NIKTO
Done by
Prajakta Shende
Cybersecurity Intern
CyberSapiens