Under Extension Details, click Select file and select the Autowasp JAR file, then click Next.Under the Extensions tab on the second row, click Add.Click on Extender located on the top row of tabs.Either temporary project or new/existing project.The autowasp.jar file will be built in /Autowasp/target/.Clone the repository to a location of your choice. These vulnerable issues can then be mapped to WSTG IDs and be used to generate an Excel report upon engaging in a penetration test.on test.Īlternatively, you can use the pre-compiled JAR here Using IntelliJ IDE This extender tool will automate and flag vulnerable network traffic issues, allowing users to send vulnerable proxy items from Burp’s proxy, intruder and repeater tab to the extender.
0 Comments
Leave a Reply. |