How to do it...

We start off by picking up a request from our captured requests:

  1. Right-click the request and select Send to Intruder:
  1. Switch to the Intruder tab and then specify a payload position. Select the place we want our payload to be at and then click the Add button:
  1. Since we are performing a brute-force login, we will use the Pitchfork attack type:
  1. Switch to the Payloads tab; this is where we will enter our payloads.
  2. Choose the ...

Get Kali Linux - An Ethical Hacker's Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.