Primary: Exploitation.
Secondary: Discovery.
Tool based / integrated into a web browser that helps detect vulnerabilities present in web applications. Includes groups and different useful tools to analyze, identify and explore vulnerabilities.
Supported technologies: Web applications (HTTP/ HTTPS).
Operative mode: Pasive/Active.
Reports:
Output reports: X
Perform a passive analysis of the requests made by the web application via a proxy. Start the tool and write in the address bar the web application URL address.
Open the “HttpFox” tool in the tools menu, and start capturing all HTTP requests.
Surfing through the web application so that the proxy tool can catch all the generated petitions.
The tool displays all the petitions captured; selecting any of them will provide the details of the HTTP request and response.
Each petitions which provides the following information:
Link: http://dotdotpwn.sectester.net
Author(s): chr1x & nitr0us
Contact: dotdotpwn [at]sectester.net
License: