CAT the manual web application penetration testing application released
CAT is an application to facilitate manual web application penetration testing. It was designed to cope with a more demanding level of application testing, taking away some of the more repetitive nature of testing and allowing the tester to focus their time instead on the individual application, enabling them to conduct a much more thorough test.
There are a number of features which CAT has to enable a wide variety of testing to be conducted:
- Request Repeater â€“ Used for repeating a single request
- Proxy â€“ Classic Inline proxy
- Fuzzer â€“ Allows for batch of tests to be sent to a server for brute forcing, parameter fuzzing, forced browsing etc.
- Log â€“ View a list of requests to sort, search repeat etc. Allows for a sequence of requests to be repeated and modified.
- Authentication Checker â€“ Two synchronised proxies which can be used to check authentication and authorisation controls.
- SSL Checker â€“ Request a specific page with various SSL ciphers and versions.
- Notepad â€“ A text/RTF editor which can be used as a scratch pad for conversions etc.
- Web Browser â€“ An integrated web browser with proxy pre-configured based on the Internet ExplorerÃs rendering engine.
There are a number of differences between CAT and currently available web proxies. Some key differences are:
- Uses Internet Explorer’s rendering engine for accurate HTML representation
- Integrated SQL Injection and XSS Detection
- Synchronised Proxies for Authentication and Authorisation checking
- Faster due to HTTP connection caching
- SSL Version and Cipher checker using OpenSSL
- Greater flexibility for importing/exporting logs and saving projects
- Tabbed Interface allowing for multiple tools at once e.g. multiple repeaters and different logs
- The ability to repeat and modify a sequence of requests (particular useful in SSO testing)
Tests that CAT covers
- Complex authorisation models
- Ability to test complex multi-phase forms e.g. single sign-on (SSO) systems
- Fuzzing forms protected by cross site request forgery (CRSF) tokens
- Supporting different encodings used by web services, Ajax and to leverage complex vulnerabilities
- Ability to perform sensitive timing attacks
- Heavy Ajax applications
Thanks to @netsparker for spreading the information on twitter.
|Penetration testing & Ethical Hacking||