Decoding with Decoder
Burp Decoder is a tool that allows the tester to convert raw data into encoded data or to take encoded data and convert it back to plain text. Decoder supports several formats, including URL encoding, HTML encoding, Base64 encoding, binary code, hashed data, and others. Decoder also includes a built-in hex editor.
Getting ready
As a web penetration test progresses, a tester might happen upon an encoded value. Burp eases the decoding process by allowing the tester to send the encoded value to Decoder and try the various decoding functions available.
How to do it...
Let’s try to decode the value of the PHPSESSID
session token found in the OWASP Mutillidae II application. When a user initially browses to the URL (http://<Your_VM_Assigned_IP_Address>/mutillidae/
), that user will be assigned a PHPSESSID
cookie. The PHPSESSID
value appears to be encrypted and then wrapped in Base64 encoding. Using Decoder, we can unwrap the value:
- Browse...