Penetration Testing mailing list archives

Re: Testing a web app with heavy JS use


From: Ben Timby <asp () webexc com>
Date: Mon, 13 Sep 2004 16:36:38 -0500

Two possibilities.

1. Use the Microsoft Script debugger to modify the values of variables in the running JS.

2. Use a proxy (like achilles) that will allow you to modify the HTTP as it travels from your browser to the server.

Hope that helps.

tblinux () covad net wrote:

Anybody know of a good way to strip or catch and manipulate input to a web app
that uses JS to do error checking AND specify the input target address? ...oh
and the "submit button" is JS driven too...
Other than hand editing 30 screens of JS code?


------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


------------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. All of our class sizes are
guaranteed to be 12 students or less to facilitate one-on-one interaction
with one of our expert instructors. Check out our Advanced Hacking course,
learn to write exploits and attack security infrastructure. Attend a course
taught by an expert instructor with years of in-the-field pen testing
experience in our state of the art hacking lab. Master the skills of an
Ethical Hacker to better assess the security of your organization.

http://www.infosecinstitute.com/courses/ethical_hacking_training.html
-------------------------------------------------------------------------------


Current thread: