Web application security - the fast guide 1.1 | Page 166

Chapter 8 - Attack Tools P a g e | 166 Figure 59:using Burp for statistical test for randomness of sample token Activity orchestration: To achieve a successful attack, you need to use an orchestration of those tools depending on the attack type and purpose. The figure below is the most common pattern to do that type of orchestration: Interception Tools Content Discovery Spiders Site Map Proxy History Attack Surface Scanner Fuzzer Vulnerabilit ies Figure 60: Tools orchestration Token Analyzer