Penetration Testing mailing list archives

Re: saving session cookies?


From: "Gary E. Miller" <gem () rellim com>
Date: Tue, 14 Mar 2006 21:07:04 -0800 (PST)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Yo offset!

I find it is more reliable to just have wget walk through the entire
auth process every time.  A lot of session cookies will not work after
a short time anyway.  Plus it is usually not more mch more work to just
do it all with wget.

RGDS
GARY
- ---------------------------------------------------------------------------
Gary E. Miller Rellim 20340 Empire Blvd, Suite E-3, Bend, OR 97701
        gem () rellim com  Tel:+1(541)382-8588

On Wed, 15 Mar 2006, offset wrote:

Some of the sites I work with, I need to go through a complex authentica
tion scheme that will allow me further into the site and wget isnt inter
active enough for me (at least for session gathering)

Basically I want to save enough data through the authentication system t
o use wget/curl/custom script later (and send appropriate session inform
ation).
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.1 (GNU/Linux)

iD8DBQFEF6D78KZibdeR3qURAtNiAKCwuBxoxHTmhdSMqij+QYUvhY780wCgh9fw
0e5RgOhSQLxcQJrmD6Tvqhw=
=874k
-----END PGP SIGNATURE-----


------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
As attacks through web applications continue to rise, you need to proactively 
protect your applications from hackers. Cenzic has the most comprehensive 
solutions to meet your application security penetration testing and 
vulnerability management needs. You have an option to go with a managed 
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you: 
http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: