Open irsdl opened 7 years ago
What kind of issue is this?
There are multiple. For example just now in my new test I have it trying to Fuzz the end of the URL but has selected something in the URLbefore the payload - perhaps it cannot predict the length after the new payload is added?
It's meant to highlight the random string it injects just before the actual payload. The odd thing is it works for me fine in testing. With that latest screenshot, are you using manual insertion points specified using the intruder?
Judging by that last screenshot, you're probably not using the latest release of backslash powered scanner. Can you try updating and see if the issue still exists?
I removed my comment - my Backslash powered scanner was outdated - will let you know how it goes on my next tests...
Closing this, feel free to reopen if you notice the issue in the latest version.
That's fine. It will probably be in two weeks that I have a test for it.
I can still recreate the issue using the latest version. It has selected this as "Magic value: null" while it had to selected the "undefined" bit - it is exactly the same in the other requests as well:
I can verify this still occurs on the latest version obtained from the BApp store.
Not a big issue for me though
when an issue is found using the automated scanner and this extension, it selects (highlight) an irrelevant part of the request rather than the actual input.