Update The-Manipulator v-0.2 : Command Line Parameter Manipulation Web Scanner

Change V-0.2 :Vast reduction in false positives; in normal mode we now compare all responses and only report those that differ. Added: multi-burplog analysis mode (-m) and user controllable range value (-r)

The manipulator is a command line scanner that seeks to identify parameter manipulation vulnerabilities. It parses Burp logs searching for numeric parameters which it analyses for parameter manipulation flaws by submitting a range of similar but different numeric values and looking for differences in the response.
What is The Manipulator?
It’s a wrapper for curl written in bash. It’s also a tool that can be used to remotely identify parameter manipulation vulnerabilities.The Manipulator is beta; don’t use it in an environment that matters to you or anyone else. Do not use The Manipulator to scan hosts without the owner’s permission.
Features :
  •  Support for automated detection and testing of parameters in POST URIs and multipart forms
  •  Scan ‘state’ maintenance: Halt a scan at any time – scan progress is saved and you can easily resume a scan from the URL where you stopped
  •  Specify a specific request number to resume a scan from
  •  HTML format output with: links/buttons to send Proof of Concept requests
What do I need to use The Manipulator?
The Manipulator is built and tested on BackTrack 5 R2. On all other platforms Your Mileage May Vary; you will need a an OS that can support bash (*nix, cygwin (not tested), etc), curl must be installed and in your path, and ‘replace’ (which is missing from many nix’s) must also be installed in in your path. Until I implement web spider functionality, The Manipulator is dependent upon burp proxy to create log files (not burp state files) which The Manipulator uses to build its internal list of fuzz requests. The free version of burp can be used to create these log files. Within Burp go to options > misc and check the proxy requests tick box; browse the target site, populate your log, then pass it to The Manipulator.
How does The Manipulator work?
The Manipulator receives a burp log (which you must create for it) that specifies a bunch of HTTP requests. Requests in the burp log look like this:
Download :  manipulator-0.2.tgz (16.7 KB)
Find Other Version |
Read more In here : http://code.google.com/p/the-manipulator/
Our post Before : http://seclist.us/the-manipulator-command-line-parameter.html