Crimson — AppSec firearm I

Karol Mazurek
7 min readAug 20, 2022

Setting up the environment for testing and crimson_recon explanation.

Source: https://creator.nightcafe.studio/creation/iLmHqmEJDDXTw6eu9ZVK

INTRODUCTION

It has been a couple of months since the last article about the automatization of Web Application Penetration Testing. From that moment, Crimson had grown up from those few code snippets described in previous articles, and if you are a kind of code-archeologist, you can check them here:

  1. Automation of the reconnaissance phase during Web Application Penetration Testing I
  2. Automation of the reconnaissance phase during Web Application Penetration Testing II
  3. Automation of the reconnaissance phase during Web Application Penetration Testing III

The whole repository is much bigger now, and the tool is now a Docker container you can run on Windows and *nix-based systems.

Source: https://github.com/Karmaz95/crimson#installation--running

In the following articles, I will guide you through the Web Application Penetration Testing process using Crimson and Burp Suite Pro on the randomly chosen Bug Bounty program with *.domain.tld as scope.

I won’t describe every part of the Crimson code — if you are curious how everything works you can check it…

--

--