If one challenge in the recon phase of the attack gets your blood pumping, it'll be trying to find out every last detail about a site without getting caught looking too curious. Casual, normal users crawl websites randomly with a focus on certain high-traffic transactions, and anything more methodical than this may arouse suspicion. Inefficient workflows may also raise flags, so being able to surf the site and game plan attacks is an incredibly useful trick to learn. In this section, we'll look at how to create a mirror of a site (without waking the defenders) for a risk-free simulation. They do say that imitation is the best form of flattery.
We'll also find that there are limitations to the site's mirror. Back-end data, higher-level scripting, and intelligence all fail to replicate without the same infrastructures at the application and...