Here you can download the source code for the example configurations of the JAttack tool introduced in Chapter 13 of the first edition.

Note that you will need to edit and recompile this source code to work with the specific application you are targeting. As discussed in Chapter 13 you should ideally use this code as a base for creating more powerful and versatile scripts for automating your bespoke attacks against applications.

JAttack - enumerating identifiers

JAttack - harvesting data

JAttack - fuzzing for vulnerabilities

Copyright © 2011 Dafydd Stuttard and Marcus Pinto. All rights reserved.