Most anyone will tell you, for web application developers, Firefox is the way to go. As many white hat or black hat security guys will tell you, the same is true for web application hackers. This being said, and after extensive time spent evaluation security related plug-ins for Firefox, I have compiled a list of the plugins that I use on a day to day basis for evaluating site security.
Although it doesn’t find 90% of what it says it will, this plugin can be somewhat useful for determining whether a server configuration is vulnerable to certain attacks that can me made with different request methods such as DELETE.
SQL Inject Me
I have seen this plugin succesfully detect several *easy-to-find* SQL Injection vulnerable form fields. But it doesn’t really do a whole lot of checking beyond the simple obvious ones.
Of all of the Security Compass plug-in’s this one is by far the most useful and does most of what it says it will. However, just because the plug-in says a site is not vulnerable to XSS doesn’t mean it truly isn’t. This plugin, like SQL Inject Me, simply checks for the simplest XSS vectors.
Of every plugin I use, I probably use the functionality of this one more than any other. This is an entire suite of tools aimed at assisting web developers with things like local validation, src highlighting, form modifications, etc. That being said, the same functionality is invaluable to web application hackers to break your forms, discover XSS vectors, and analyze your code for other problems.
Like Web Developer, this plugin was designed and built with the developer in mind. However, with enhanced JS debugging capabilities, and arguably the best DOM browser there is, this plugin has singlehandedly been responsible for more XSS powered CSRF exploits in my audits than every tool in my toolkit combined. This is a must-have.
This is an entire suite of tools that allow you to pseudo anonymously get a pretty detailed domain recon report from a single click, or parts of that report individually. This can come in very handy when performing an audit on a site or app that you know very little about to begin with and often gives insight into the system and server architecture of the target that can prove invaluable to finding holes.
If you haven’t heard of TOR you probably have no idea what I am talking about in most of the above plugins. While it is by no means perfect, and can never replace a good proxy chain, TOR provides basic anonymization of your internet traffic. This button allows you to switch in and out of TOR mode in firefox with a single click.
Firecookie is actually an extension to the FireBug plugin, and thus requires that FireBug be running and installed. However, it provides a means to view and edit cookies in real-time.
This plugin can prove invaluable when used correctly, for everything from spoofing user-agent to spoofing client ip, this is a must have for any hackers toolbox.
Like Modify Headers, the Tamper Data plugin allows you to modify headers and cookies. The difference is, it does so on a Per-Request policy, meaning that if you are enumerating manually to isolate a bug, this plug-in will prove to be your best friend. I have broken many a webservice with this tool.
This is by no means an extensive list of plugin’s that are security related for firefox, and I am sure there are probably some that I don’t know about yet that are just as valuable as the others listed here; so if you have one that you feel belongs on this list, leave a comment and let the people know about it!