Web Application Pentesting Tools can prove to be very helpful while performing penetration testing.

In this lab exercise, we will take a look at how to use Burp Suite to perform passive crawling on the Mutillidae web application.

Step 1: Open the lab link to access the Kali machine.

image5

Step 2: Check if the target machine is reachable:

Command:

ping -c 4 demo.ine.local

image2

The target is reachable.

Step 3: Run an nmap scan against the target:

Command:

nmap -sS -sV demo.ine.local

image1

Port 80 and 3306 are open.

Step 4: Access the web application using firefox.

Command:

firefox http://demo.ine.local

image9

Step 5: The target is running OWASP Mutillidae II. Configure the firefox browser to use burp suite proxy.

image4

Step 6: Start burp suite.

image6

Go to the Proxy tab, and turn off the intercept.

image0

Step 7: Navigate to the Dashboard tab.

image10

You will see that Passive Crawling is enabled.

Browse the Mutillidae application and burp will automatically crawl the visited pages.

The passive crawler statistics are mentioned.

image3

Step 8: Go to the "HTTP history" tab under Proxy.

image7

The visited web pages will appear under this tab.

Step 9: Navigate to “Target” tab and the sitemap of the web application will be displayed.

image8

Conclusion

In this lab, we saw how to use Burp Suite to perform passive crawling on a web application.

References