·         Firebug

·         Htrack – use to mirror websites

 

Run firebug in firefox browser from Kali machine or windows machine

A.      Examine the Security tab under the Console section. Under this tab, Firebug displays all the issues related to the security of the website’s architecture. May show password fields are present on an insecure (http://) page.

This vulnerability allows attackers to easily sniff the passwords in plain text.

 

B.      Click the Inspector tab in the Firebug UI. The Inspector section contains two tags: head and body, which contain scripts and text that might reveal the build of the website.

The head and body tags contain information related to the authentication of the username and password fields, such as the type of input that is to be given in the fields (numbers or characters, or combination of numbers and characters, etc.) which allows attackers to narrow down their exploitation techniques.

C.      The Style Editor tab provides the information of CSS and Script of the HTML and Java scripts that were used to design the webpage.

D.      Click the Network tab in the Firebug control panel. This tab displays the GET requests and responses for all the items in the Net section such as HTML, CSS, etc., along with their size, status, timeline, domain and remote IP

 

Under the All tab, click a GET request related to the target website.

 

Under the Headers tab, expand the Response Headers node and observe the Server Name (IIS) and its version, along with the Web Application Framework (ASP.NET) used to develop the website and its version. By learning this, attackers can target the vulnerabilities of that specific version in an attempt to exploit the web application.

 

Attackers can use sniffing techniques to steal the cookies and manipulate them, thereby hijacking the session of an authenticated user without the need of entering legitimate credentials