NPTL – Ethical Hacking
Created By: Madhur Jatiya
Email:
[email protected]
Suite to intercept and modify the traffic between your browser and the
target web application.
2. Identify the login page - Use your browser to navigate to the login
page of the target web application.
3. Capture the login request - In Burp Suite, switch to the "Proxy" tab
and ensure that intercept is turned on. Refresh the login page in your
browser, and Burp Suite should intercept the request.
4. Configure the Intruder - In the Intruder tool, switch to the "Positions"
tab and select the login form fields that you want to attack (usually the
username and password fields). Switch to the "Payloads" tab and select
the "Payload type" to use for the attack. There are several options
available, but the most common are "Simple list" (a list of passwords to
try). In the "Payload options" section, enter the values you want to try.
You can use a dictionary attack, which is a list of common passwords or
brute-force attack, which generates random passwords.
5. Start the attack - Once you have configured the Intruder, click the
"Start attack" button to begin the password attack. Burp Suite will
automatically send the login request with each payload value, and you
can monitor the responses in the "Intruder" tab.
6. Analyse the results - After the attack has finished, you can analyse the
results in the "Intruder" tab. Look for any successful logins and note the
username and password combination that worked.
25. What do you understand by social engineering
attacks? Explain in detail.
Ans: Social engineering is a manipulation technique that exploits
human error to obtain private information or valuable data. In
cybercrime, the human hacking scams entice unsuspecting users
to disclose data, spread malware infections, or give them access
to restricted systems. Attacks can occur online, in-person, and by
other interactions.