Thanks all for your input.
To test if the Fuzzer feature behavior as expected while trying to crack a password, I have created a small dictionary list file including the right password. After wrong logging to the web application, I have fuzzed the password string by adding payload pointing to my customized file including the right password string. I am expecting that after the completion of the Fuzzer process to see the following behaviours:
1. Expected:
The size Resp. Header for the request with the right password payload very small (as mentioned by Simon) compared to the wrong springs payloads.
1. Output:
The current size resp. header for the right password string payload is identic to all wrong attempted password payloads
2. Expected:
After searching the right strings (when a user is authenticated and get access to the application, for instance, <Welome UserX>, and <Sign Out> strings after a success logging), I would expect after performing this string search in the HTTP Fuzz Results, the correcting HTTP request should be found as the attack string payload has the right password.
2. Output
No strings(Welcome UserX and/or Sign Out) from the HTTP Fuzz Results were found
This is a basic validation to test the Fuzzer feature,
any zapper expert have an explication and tell me what I am doing wrong with this basic test scenario.
Thanks in adavnce