Web application security - the fast guide 1.1 | Page 166
Chapter 8 - Attack Tools
P a g e | 166
Figure 59:using Burp for statistical test for randomness of sample token
Activity orchestration:
To achieve a successful attack, you need to use an orchestration of those tools
depending on the attack type and purpose.
The figure below is the most common pattern to do that type of orchestration:
Interception
Tools
Content
Discovery
Spiders
Site Map
Proxy
History
Attack Surface
Scanner
Fuzzer
Vulnerabilit
ies
Figure 60: Tools orchestration
Token
Analyzer