Advertisements

 Firefox extensions for web developers and penetration testers

Written by SkyOut & Veda, wired-security.net

Thursday, 19 June 2008

____________________________________________________________________________

01010111 01001001 01010010 01000101 01000100 01010011 ->
01000101 01000011 01010101 01010010 01001001 01010100 ->
01011001

____________________________________________________________________________
FIREFOX EXTENSIONS FOR WEB DEVELOPERS AND PENETRATION TESTERS
____________________________________________________________________________

_____________________________________________
|| 0x00: ABOUT ME
|| 0x01: FOR WHOM IS THIS INFORMATION USEFUL?
|| 0x02: TAMPER DATA
|| 0x03: VIEW COOKIES
|| 0x04: COOKIESAFE
|| 0x05: USERAGENTSWITCHER
|| 0x06: QUICKJAVA
|| 0x07: WEB DEVELOPER
|| 0x08: XML DEVELOPER TOOLBAR
|| 0x09: HACKBAR
|| 0x10: SERVER SPY
|| 0x11: FIREBUG
|| 0x12: LIVE HTTP HEADERS
|| 0x13: HEADER MONITOR
|| 0x14: MODIFY HEADERS
|| 0x15: XSS ME
|| 0x16: SQL-INJECT ME

____________________________________________________________
____________________________________________________________

_________________
|| 0x00: ABOUT ME

Author: SkyOut, Veda
Date: February 2008
Website: http://wired-security.net/

_____________________________________________
|| 0x01: For whom is this information useful?

The following Firefox extensions are sometimes made for web developers and
therefore provide more detailed information about the structure of a website.
This information can also be helpful to a penetration tester, who is analyzing
a website for vulnerabilities. Some extensions are even made for penetrating a
website and are very handy and easy to use. All extensions have been with
Firefox 2.0.0.*!

____________________
|| 0x02: Tamper Data

https://addons.mozilla.org/de/firefox/addon/966 by Adam Judson

---
Use tamperdata to view and modify HTTP/HTTPS headers and post parameters.

Trace and time http response/requests.

Security test web applications by modifying parameters (GET, POST and headers).
---

_____________________
|| 0x03: View cookies

https://addons.mozilla.org/de/firefox/addon/315 by Edwin Martin

---
It adds a tab to the Page Info dialog box, which shows the cookies of the
current webpage. This is interesing for developers, privacy-concious users and
others.
---

___________________
|| 0x04: CookieSafe

https://addons.mozilla.org/de/firefox/addon/2497 by Ron Beckman

---
This extension will allow you to easily control cookie permissions. It will appear
on your statusbar. Just click on the icon to allow, block, or temporarily allow the
site to set cookies. You can also view or clear the cookies and exceptions by right
clicking on the statusbar icon. For safer browsing you may choose to deny cookies
globally and then enable them on a per site basis.
---

__________________________
|| 0x05: UserAgentSwitcher

http://chrispederick.com/work/user-agent-switcher/ by Chris Pederick

---
The User Agent Switcher extension adds a menu and a toolbar button to switch the user
agent of the browser. It is designed for Firefox, Flock and Seamonkey, and will run on
any platform that these browsers support including Windows, Mac OS X and Linux.
---

__________________
|| 0x06: QuickJava

https://addons.mozilla.org/de/firefox/addon/1237 by Doug G

---
Allows quick enable and disable of Java and Javascript from statusbar.
---

______________________
|| 0x07: Web Developer

https://addons.mozilla.org/de/firefox/addon/60 by Chris Pederick

---
Adds a menu and a toolbar with various web developer tools.
---

______________________________
|| 0x08: XML Developer Toolbar

https://addons.mozilla.org/de/firefox/addon/2897 by Scott Root II

The XML Developer's Toolbar!!!

---
Finally, a toolbar modeled after Chris Pederick's WebDeveloper toolbar, that allows XML
Developer's use of standard tools all from your browser!

Features include:
-Schema Generation
-DTD Generation
-Schema Validation
-XML -> Schema Validation
-Style Manipulation
-XSL Transformations on-the-fly
-DOM Inspector incorporated views
-Document statistics for future Semantic Web purposes
-SOA Module (coming soon)
-Lame scratch pad that does...nothing really useful :p
---

________________
|| 0x09: HackBar

https://addons.mozilla.org/de/firefox/addon/3899 by Johan Adriaans

---
# New features
- Show / Hide hotkey [F9]
- Tab sensitive
- Auto load, split and focus when pressing hotkey on a new URL.
- Localized ( English and dutch for now )
- Textarea width set to 100% (removed dragbar)
- Complete code revision (OO based instead of functions)

# In general
This toolbar will help you in testing sql injections, XSS holes and site security.
It is NOT a tool for executing standard exploits and it will NOT teach you how to
hack a site. Its main purpose is to help a developer do security audits on his code.
If you know what your doing, this toolbar will help you do it faster. If you want to
learn to find security holes, you can also use this toolbar, but you will probably also
need a book, and a lot of google :)

# The advantages are:
- Even the most complicated urls will be readable
- The focus will stay on the textarea, so after executing the url (ctrl+enter) you can
just go on typing / testing
- The url in textarea is not affected by redirects.
- I tend to use it as a notepad :)
- Usefull tools like on the fly uu/url decoding etc.
- All functions work on the currently selected text.


# Load url ( alt a )
This loads the url of the current page into the textarea.

# Split url ( alt s )
When this button is clicked, the url/text in the textarea will be split into multiple
lines using the ? and & character

# Execute ( alt x, ctrl enter )
This will execute the current url in the textarea, i mostly use ctrl+enter

# INT -1 ( alt - )
First select a number in the textarea and press this button, the number will be lowered
by 1 and the url will be loaded.

# INT +1 ( alt + )
Again first select a number in the textarea and press this button, 1 will be added to the
number and the url will be loaded.

# MD5 Hash ( alt m )
this is a standard hashing method, often used as an encryption method for passwords.
It will MD5 hash the currently selected string.

# MySQL CHAR() ( alt y )
If quotes are escaped but you did find an SQL injection thats exploitable, you can use
this button to convert lets say:
load_file('/etc/passwd') --> load_file(CHAR(47, 101, 116, 99, 47, 112, 97, 115, 115, 119, 100))
Thus omiting the use of quotes to load a file.
You can also use this on
WHERE foo LIKE ('%bar%') --> WHERE foo LIKE (CHAR(37, 98, 97, 114, 37))

# MsSQL CHAR() ( alt q )
Same story as MySQL CHAR(), MsSQL has a slightly different CHAR syntax
--> WHERE foo LIKE ( CHAR(37) + CHAR(98) + CHAR(97) + CHAR(114) + CHAR(37))

# Base64 encode / decode
Base64 encoding ( UU ) is often used to store data (like a return url etc.) This will
help you to read those values.

# URLencode / decode
This will encode or decode the currently selected characters to url safe characters.
I mostly use it to end a query with # (%23) when in a pseudo path where i cant use /* or --
---

___________________
|| 0x10: Server Spy

https://addons.mozilla.org/de/firefox/addon/2036 by Christophe Jacquet

---
Server Spy indicates what brand of HTTP server (e.g. Apache, IIS, etc.)
runs on the visited sites. When a tab is selected, the corresponding server
name is shown on the right-hand side of the browser's status bar.
---

________________
|| 0x11: Firebug

https://addons.mozilla.org/de/firefox/addon/1843 by Joe Hewitt

---
Firebug integrates with Firefox to put a wealth of development tools at
your fingertips while you browse. You can edit, debug, and monitor CSS,
HTML, and JavaScript live in any web page.

Visit the Firebug website for documentation, screen shots, and discussion forums:

http://www.getfirebug.com
---

__________________________
|| 0x12: Live HTTP Headers

https://addons.mozilla.org/de/firefox/addon/3829 by Daniel Savard, Nicolas Coukouma

---
View HTTP headers of a page and while browsing.
---

_______________________
|| 0x13: Header Monitor

https://addons.mozilla.org/de/firefox/addon/575 by Alexey Biznya

---
This is Firefox extension for display on statusbar panel any HTTP response
header of top level document returned by a web server. Example: Server
(by default), Content-Encoding, Content-Type, X-Powered-By and others.

Important: This extension obtains headers from LiveHTTPHeaders. Therefore, in order to use
HeaderMonitor first install extension LiveHTTPHeaders from
http://livehttpheaders.mozdev.org/installation.html
---

_______________________
|| 0x14: Modify Headers

https://addons.mozilla.org/de/firefox/addon/967 by Gareth Hunt

---
Add, modify and filter http request headers. You can modify the user
agent string, add headers to spoof a mobile request (e.g.
x-up-calling-line-id) and much more. Take a look at the help tab of the Modify Headers window.

Some people think that 'user-agent' is a custom way of specifying the user agent string.
This is not true, for a guide on this and other HTTP request headers, look at this W3C page:
http://www.w3.org/Protocols/HTTP/HTRQ_Headers.html

Please DO NOT post support requests or issues here. To make suggestions or report issues, please go to
http://modifyheaders.mozdev.org/bugs.html
---

_______________
|| 0x15: XSS-Me

http://www.securitycompass.com/exploit_me/xssme/xssme-0.2.1.xpi by http://www.securitycompass.com/

---
XSS-Me is the Exploit-Me tool used to test for reflected Cross-Site Scripting (XSS) vulnerabilities.
---

______________________
|| 0x16: SQL Inject-Me

http://www.securitycompass.com/exploit_me/sqlime/sqlime-0.2.xpi by http://www.securitycompass.com/

---
SQL Inject-Me is the Exploit-Me tool used to test for SQL Injection vulnerabilities.
---

<!> Happy Hacking <!>

____________________________________________________________________________
____________________________________________________________________________

EOF



Share this content:
        
Advertisements
Home | News | Articles | Advisories | Submit | Alerts | Links | What is XSS | About | Contact | Some Rights Reserved.