On this page

Exercise 01: Passive Recon

In this exercise we will look at some simple techniques for passive recon of the target application.

The aim of passive recon is to be stealthy and not alert the website owner that we are attacking it.

Analysing Web Traffic with Burp Proxy

Burp Proxy allows us to intercept and inspect the underlying HTTP requests and responses transmitted between our browser and the target web server.

First launch Burp Suite. You can find it under the Web Application Analysis category in the Kali applications menu, or your Windows Start Menu. You may get a warning about your installed Java version, but this can usually be ignored.

Proceed with a temporary project and the default Burp configuration:

Burp Suite Community Edition welcome screen. "Temporary project in memory" is selected.

Burp welcome/configuration screen. "Use Burp defaults" is selected.

Go to the Proxy > Intercept tab and click the Open Browser button:

The Burp Suite window with the "Proxy" tab selected. Underneath that the "Intercept" tab is selected. The "Open browser" button can be seen on the right of the window.

This will launch the Chromium browser that is bundled with Burp Suite and is preconfigured to proxy requests through it. You can also use an external browser, but you will need to configure it to proxy through Burp (for example, see Configuring Firefox to work with Burp Suite).

Browse to the target site again in Burp's browser and navigate around a bit. Then head back to Burp and select the Proxy > HTTP History tab. You should see all the requests for the pages you just visited. Click on any request to view the raw HTTP request and subsequent response from the server:

Burp Suite with the Proxy HTTP history tab selected. A request to the reviews API is selected and the raw HTTP request and responses can be seen at the bottom of the window.

Some things you to look out for at this stage:

Product Reviews API Information Disclosure

As you were browsing around the site, you may have noticed that there is an API that returns member reviews for a given product. This API leaks some information in its response that isn't displayed on the site. Can you spot what it is?

Subdomain Enumeration with Sublist3r

Subdomain enumeration is the process of finding valid subdomains for a given domain. This is a great way to discover dev or staging deployments, admin panels, or other related applications.

We'll use the sublist3r command-line tool for this. Sublist3r queries a number of third-party services to discover subdomains such as DNS (Domain Name System), Google, and Bing. Although this is an automated scanner, we consider it a passive technique because it does not make requests to the target application itself.

Open a terminal in Kali and enter the following command:

sublist3r -d scummbar.site

Keep a note of any subdomains you find. We'll scan them in the next exercise on active recon!

Resources