pentest-book
  • Welcome
  • Cybersecurity Lecture notes
  • Exploit management
  • Recon
    • Public info gathering
    • Root domains
    • Subdomain Enum
      • Subdomain Takeover
    • Webs recon
    • Network Scanning
    • Host Scanning
    • Packet Scanning
  • Enumeration
    • Files
    • SSL/TLS
    • Ports
    • Web Attacks
      • General Info
      • Quick tricks
      • Header injections
      • Bruteforcing
      • Online hashes cracked
      • Crawl/Fuzz
      • LFI/RFI
      • File upload
      • SQLi
      • SSRF
      • Open redirects
      • XSS
      • CSP
      • XXE
      • Cookie Padding
      • Webshells
      • CORS
      • CSRF
      • Web Cache Poisoning
      • Broken Links
      • Clickjacking
      • HTTP Request Smuggling
      • Web Sockets
      • CRLF
      • IDOR
      • Web Cache Deception
      • Session fixation
      • Email attacks
      • Pastejacking
      • HTTP Parameter pollution
      • SSTI
      • Prototype Pollution
      • Command Injection
      • Deserialization
      • DNS rebinding
    • Web Technologies
      • APIs
      • JS
      • ASP.NET
      • JWT
      • GitHub
      • GitLab
      • WAFs
      • Firebird
      • Wordpress
      • WebDav
      • Joomla
      • Jenkins
      • IIS
      • VHosts
      • Firebase
      • OWA
      • OAuth
      • Flask
      • Symfony && Twig
      • Drupal
      • NoSQL (MongoDB, CouchDB)
      • PHP
      • RoR (Ruby on Rails)
      • JBoss - Java Deserialization
      • OneLogin - SAML Login
      • Flash SWF
      • Nginx
      • Python
      • Tomcat
      • Adobe AEM
      • Magento
      • SAP
      • MFA
      • GWT
      • Jira
      • OIDC (Open ID Connect)
      • ELK
      • Sharepoint
      • Others
    • Cloud
      • General
      • Cloud Info Gathering
      • AWS
      • Azure
      • GCP
      • Docker && Kubernetes
      • CDN - Comain Fronting
  • Exploitation
    • Payloads
    • Reverse Shells
    • File transfer
  • Post Exploitation
    • Linux
    • Pivoting
    • Windows
      • AD
        • Kerberos
      • PS tips & tricks
  • Mobile
    • General
    • Android
    • iOS
  • Others
    • Burp Suite
    • Password cracking
    • VirtualBox
    • Code review
    • Pentesting Web checklist
    • Internal Pentest
    • Web fuzzers review
    • Recon suites review
    • Subdomain tools review
    • Random
    • Master assessment mindmaps
    • BugBounty
    • Exploiting
    • tools everywhere
Powered by GitBook
On this page
  • Tips
  • Preferred extensions
  • Private collaborator server
  • Collaborator SSRF explotation mindmap
Edit on GitHub
  1. Others

Burp Suite

Tips

- If Render Page crash:
sudo sysctl -w kernel.unprivileged_userns_clone=1

- If embedded browser crash due sandbox:
find .BurpSuite -name chrome-sandbox -exec chown root:root {} \; -exec chmod 4755 {} \;

- Scope with all subdomains:
.*\.test\.com$

- Use Intruder to target specific parameters for scanning 
  - Right click: actively scan defined insertion points 

# Configuration
- Project Options -> HTTP -> Redirections -> Enable JavaScript-driven
- User Options -> Misc -> Proxy Interception -> Always disabled
- Target -> Site Map -> Show all && Show only in-scope items

# XSS Validator extension
1) Start xss.js phantomjs $HOME/.BurpSuite/bapps/xss.js
2) Send Request to Intruder
3) Mark Position 
4) Import xss-payload-list from $Tools into xssValidator
5) Change Payload Type to Extension Generated
6) Change Payload Process to Invoke-Burp Extension - XSS Validator
7) Add Grep-Match rule as per XSS Validator
8) Start.

# Filter the noise
https://gist.github.com/vsec7/d5518a432b70714bedad79e4963ff320

# Filter the noise TLDR
# TLS Pass Through
.*\.google\.com
.*\.gstatic\.com
.*\.googleapis\.com
.*\.pki\.goog
.*\.mozilla\.com

# Send swagger to burp
https://github.com/RhinoSecurityLabs/Swagger-EZ
# Hosted: 
https://rhinosecuritylabs.github.io/Swagger-EZ/

# If some request/response breaks or slow down Burp
- Project options -> HTTP -> Streaming responses -> Add url and uncheck "Store streaming responses...."

# Burp Extension rotate IP yo avoid IP restrictions
https://github.com/RhinoSecurityLabs/IPRotate_Burp_Extension

# Collab/SSRF/pingback alternative
interactsh.com
requestcatcher.com
canarytokens.org
webhook.site
ngrok.com
pingb.in
swin.es
requestbin.net
ssrftest.com
rbnd.gl0.eu
dnslog.cn
beeceptor.com

# Run private collaborator instance in AWS
https://github.com/Leoid/AWSBurpCollaborator

# Run your own collab server
https://github.com/yeswehack/pwn-machine

# Wordlist from burp project file
cat project.burp | strings | tok | sort -u > custom_wordlist.txt

# Autorize:
  1. Copy cookies from low priv user and paste in Autorize
  2. Set filters (scope, regex)
  3. Set Autorize ON
  4. Navigate as high priv user
  
# Turbo Intruder
basic.py -> Set %s in the injection point and specify wordlist in script
multipleParameters.py -> Set %s in all the injection points and specify the wordlists in script

# Customize Audit Scans
Configure your audit profile -> Issues reported -> Individual issues -> right-click on "Extension generated issues" -> "Edit detection methods"
Works on most of issues like SQLi

# Send to local Burp from VPS
# In local computer
ssh -R 8080:127.0.0.1:8080 root@VPS_IP -f -N
# In VPS
curl URL -x http://127.0.0.1:8080

# Ip rotation
https://github.com/ustayready/fireprox

Preferred extensions

Private collaborator server

PreviousiOSNextPassword cracking

Last updated 2 years ago

: Active and passive checks customizable based on patterns.

More active and passive scans.

Passive scan to detect vulnerable software versions

Passive scan to detect hidden or unlinked parameters, cache poisoning

Active scan for SSTI detection

Passive CSRF detection

Active and Passive scan for Java and .NET deserialization

decode and manipulate JSON web tokens

generates scripts for Python, Ruby, Perl, PHP and PowerShell

other extension for export request to multiple languages

Passive scan to find vulnerable JavaScript libraries

Active scan for Web Cache Deception vulnerability

Passive check for decrypt/decode Netscaler, F5 BigIP, and Flask cookies

Passive scan to find reflected XSS

Active checks to discover different kind of J2EE vulnerabilities

Active scanner and launcher for HTTP Request Smuggling attacks

History of all burp tools, extensions and tests

Allows Burp Collaborator in a new tab

Useful for sending large numbers of HTTP requests (Race cond, fuzz, user enum)

Automatically repeats requests with replacement rules and response diffing

Tests multiple upload vulnerabilities

: Active scan check to find PHP object injection

Active and passive scanner to find Java deserialization vulnerabilities

Used to detect IDORs

Easy view for VIEWSTATE parameter

generates SOAP requests from WSDL request

Inject headers to reveal backend systems by causing pingbacks

Exfiltrate blind remote code execution output over DNS

Add some headers to bypass some WAFs

for testing SAML infrastructures, messages and certificates

create wordlists from target

Log for every burp tool and allows highlight, filter, grep, export...

Parse and fetch OpenAPI documents directly from a URL

: Multiple functions such sqlmapper, cewler

: XSS intruder payload generator and checker

: command injection payload generator

: Adds a customizable "Send to..."-context-menu.

: Automates SSRF detection

Collaborator SSRF explotation

Burp Bounty Pro
Active Scan ++
Software Vulnerability Scanner
Param Miner
Backslash Powered Scanner
CSRF Scanner
Freddy
JSON Web Tokens
Reissue Request Scripter
Burp-exporter
Retire.js
Web Cache Deception Scanner
Cookie decrypter
Reflector
J2EEScan
HTTP Request Smuggler
Flow
Taborator
Turbo Intruder
Auto Repeater
Upload Scanner
poi Slinger
Java Deserialization Scanner
Autorize
.NET Beautifier
Wsdler
Collaborator Everywhere
Collabfiltrator
Bypass WAF
SAMLRaider
GoldenNuggets-1
Logger++
OpenAPI Parser
CO2
XSSValidator
Shelling
burp-send-to
ssrf-king
mindmap
GitHub - putsi/privatecollaborator: A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificateGitHub
Setting a Private Burp Collaborator ServerSecurity Blog
Self-hosted Burp collaborator with custom domainTeam ROT Information Security
Logo
Logo