Entropy Analysis

The below example is based on the crAPI application.

We can check if the token has a somewhat predictable pattern, and if that is the case, we could try brute-forcing it with Intruder (Figure 1).

Figure 1: Performing entropy analysis with Burp's Sequencer.

Last updated

Was this helpful?