infosecgirls
Appsec
Appsec
  • Introduction
  • Application Details
    • VM - Pre-req
    • Import Virtual Machines
    • Access Mutillidae Web Application
  • INITIAL SETUP WITH OWASP ZAP
    • OWASP ZAP
    • Setup OWASP ZAP
    • Modes
    • Automated Scan
    • Report Generation
  • Initial Setup with Burp
    • Start Burp Suite
    • Add FoxyProxy Addon
    • Add New Proxy In FoxyProxy
    • Configure Proxy Listener
    • Install Burp's CA Certificate In Firefox
    • Getting Rid of Unnecessary Browser Traffic
  • Quick Basics
    • Disable Intercept Mode in Burp
    • Enable Intercept Mode in Burp
    • Send to Repeater
    • Send to Comparer
  • Web Application Pentesting
    • A1 - Injection
      • SQL Injection with bWAPP
      • SQL Injection in DVNA
      • Command Injection in DVNA
    • A2 - Broken Authentication
      • Broken Authentication with bWAPP
    • A3 - Sensitive Data Exposure
      • Sensitive Data Exposure - DVNA
    • A4 - XML External Entities (XXE)
      • XML External Entity (XXE) Injection - Mutillidae
      • XML External Entity (XXE) Injection - DVNA
    • A5 - Broken Access Control
      • Broken Access Control - DVNA
    • A6 - Security Misconfiguration
      • Security Misconfiguration in DVNA
      • Security Misconfiguration in Mutillidae
      • Security Misconfiguration in Security Shepherd
    • A7 - Cross-Site Scripting (XSS)
      • Reflected XSS
      • DOM XSS
      • Stored XSS - Mutillidae
      • XSS - Sending data to remote server
    • A8 - Insecure Deserialization
      • Insecure Deserialization - DVNA
    • A9 - Using Components with Known Vulnerabilities
      • Using Components with Known Vulnerabilities - DVNA
    • 10 - Insufficient Logging & Monitoring
    • References
    • About Us
  • Additional Content
    • Insecure Direct Object Reference
    • Security Misconfiguration
    • Password Guessing Attack
    • User Enumeration
      • Unauthenticated User Access
      • Create a New User
      • Authenticated User Access
      • Intruder: Set Positions
      • Intruder: Define Payload
      • Intruder: Configure Grep - Extract
      • Trigger Attack & Save Results
    • Custom Iterator
    • Null Payload
    • Request in Browser: Privilege Escalation Check
  • Burp Extenders
    • Target
    • Proxy
    • Intruder
    • Repeater
    • Sequencer
    • Decoder
    • Comparer
    • Extender
Powered by GitBook
On this page

Was this helpful?

  1. Burp Extenders

Sequencer

PreviousRepeaterNextDecoder

Last updated 6 years ago

Was this helpful?

This is a sophisticated tool for analyzing the quality of randomness in an application's session tokens or other important data items that are intended to be unpredictable.

  1. Go to Burp > "Proxy" tab > "HTTP history" sub-tab and right-click within the results table to open the context menu.

  2. Select "Show new history window" option from the context menu.

  3. In the new "Burp Proxy HTTP History" window, click on "Filter" tab to view the various display filter options.

  4. In the display filter window, select the checkbox labeled as "Show only parameterized requests".

  5. Identify a parameterized request which you may wish to tamper with.

  6. Click on the "Cookies" column twice, to identify requests that issue a session token.

  7. Select the /login POST request.

  8. Right-click on the selected request, and select "Send to Sequencer" option from the context menu.

  9. Go to "Sequencer" > "Live capture" tab, and in the "Select Live Capture Request" section, select the item that you have just sent.

  10. In the "Token Location Within Response" section, select the "Cookie" radio button.

  11. Select a token from the dropdown menu. For this example, let's select the token named as "token".

  12. Click on the "Start live capture" button.

  13. When a few hundred tokens have been obtained, pause the live capture session and click the "Analyze now" button.

  14. You should see the results of the randomness tests.

  15. Go to "Character-level analysis" > "Count" tab and read the details listed under "Anomalies" section.

  16. Explore the data shown in different tabs and sub-tabs.

Identify a request for further analysis
New history window
Show only parameterized requests
Order by cookies
Send to sequencer
Select a request that sets a session token
Display Filter
Results of randomness tests
Pause and analyze
Start live capture
Character analysis
Select a token that's being set