🚨🚨
I am starting the #BurpHacksForBounties series for 30 days, each day will share a Burp hack, which makes my working with Burp Suite easier.
Starting Monday. Stay tuned.
They will not be the ones you find on the internet 😉😉
#infosec #appsec #bugbounties #bugbountytips
I am starting the #BurpHacksForBounties series for 30 days, each day will share a Burp hack, which makes my working with Burp Suite easier.
Starting Monday. Stay tuned.
They will not be the ones you find on the internet 😉😉
#infosec #appsec #bugbounties #bugbountytips
#BurpHacksForBounties - Day 1/30
Turbo intruder: Power of Python with Burp Suite Intruder.
I use it to tailor my pen-testing for a specific target and targetted #bugbounty
#infosec #appsec #bugbountytips #bugbountytip #security
How to - 🧵🙃👇
Turbo intruder: Power of Python with Burp Suite Intruder.
I use it to tailor my pen-testing for a specific target and targetted #bugbounty
#infosec #appsec #bugbountytips #bugbountytip #security
How to - 🧵🙃👇
3/n
Details in comments.
Code: https://gist.github.com/r0hi7/47e3d47efaa1ee3df63a6e936dade787
Increase concurrency or can add pipeline.
Then click attack.
Details in comments.
Code: https://gist.github.com/r0hi7/47e3d47efaa1ee3df63a6e936dade787
Increase concurrency or can add pipeline.
Then click attack.
n/n
You can do almost anything with Python inside Burp.
Eg.
- Handle custom login
- Tailored testing
- Filter out requests on "interesting" responses
- Scale your testing
- Add rate limiting, pipeline, etc
This approach can overcome intruder multithreading deficiencies in CE.
You can do almost anything with Python inside Burp.
Eg.
- Handle custom login
- Tailored testing
- Filter out requests on "interesting" responses
- Scale your testing
- Add rate limiting, pipeline, etc
This approach can overcome intruder multithreading deficiencies in CE.
Snaffler
Snaffler - Gets a list of Windows computers from Active Directory, then spreads out its snaffly appendages to them all to figure out which ones have file shares, and whether you can read them
https://github.com/SnaffCon/Snaffler
#pentest
Snaffler - Gets a list of Windows computers from Active Directory, then spreads out its snaffly appendages to them all to figure out which ones have file shares, and whether you can read them
https://github.com/SnaffCon/Snaffler
#pentest
GitHub
GitHub - SnaffCon/Snaffler: a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax…
a tool for pentesters to help find delicious candy, by @l0ss and @Sh3r4 ( Twitter: @/mikeloss and @/sh3r4_hax ) - SnaffCon/Snaffler
#BurpHacksForBounties - Day 2/30
Effective usage of Match and Replace feature of Burp Suite
False2True Trick & Injecting all fields with polyglot payloads 😉😉
How to thread 🧵👇
#infosec #security #appsec #burp #bugbounty #bugbountytips
Effective usage of Match and Replace feature of Burp Suite
False2True Trick & Injecting all fields with polyglot payloads 😉😉
How to thread 🧵👇
#infosec #security #appsec #burp #bugbounty #bugbountytips
1/n False2True trick, when access to a resource for the user is unauthorized.
By changing server response body from F to T in burp response body match and replace, there are great chances it can un-hide client-side controls.
1. Add Match and replace.
2. Add shown replacement.
By changing server response body from F to T in burp response body match and replace, there are great chances it can un-hide client-side controls.
1. Add Match and replace.
2. Add shown replacement.
3/n
The above match and replace rule will replace all KKK in the request body to SQLi and XSS polyglot.
Say I use this :
And put KKK in all fields. All fields will be replaced with this payload.
It will find trivial XSS and SQLi.
The above match and replace rule will replace all KKK in the request body to SQLi and XSS polyglot.
Say I use this :
'"><script src="somesrc"></script><h1>testAnd put KKK in all fields. All fields will be replaced with this payload.
It will find trivial XSS and SQLi.
♥️ #BurpHacksForBounties - Day 3/30 ♥️
🔍🔎
Find References: The most underrated and underused feature of Burp Suite
Pro Only & Can find references for URIs across the entire Burp.
A short thread : 🧵👇
#infosec #appsec #security #burp #bugbountytip #bugbountytips
🔍🔎
Find References: The most underrated and underused feature of Burp Suite
Pro Only & Can find references for URIs across the entire Burp.
A short thread : 🧵👇
#infosec #appsec #security #burp #bugbountytip #bugbountytips
2/n
A new window will open up which will show the references and location of those references as well.
Location can be a repeater, scanner, etc.
The reference can be in Request, Response, Headers. Will be highlighted like the one shown in the image.
A new window will open up which will show the references and location of those references as well.
Location can be a repeater, scanner, etc.
The reference can be in Request, Response, Headers. Will be highlighted like the one shown in the image.
3/n
Can be used to discover the request sent by script from the browser and learn it to craft your valid payload request to that endpoint.
More references:
https://portswigger.net/burp/documentation/desktop/functions/search
Can be used to discover the request sent by script from the browser and learn it to craft your valid payload request to that endpoint.
More references:
https://portswigger.net/burp/documentation/desktop/functions/search
portswigger.net
Search
In this section Simple text search Find comments Find scripts Find references (links) to a particular URL Text search You can perform suite-wide searches in ...
🍺🤡 #BurpHacksForBounties - Day 4/30
Don't ignore junk-looking information in Burp Suite.
Keep this setting on, and play with zipped data in Burp Suite.
🤫🤫 You can change zipped data in req
Learned from @stokfredrik
#infosec #appsec #security #burp #bugbountytips #bugbountytip
Don't ignore junk-looking information in Burp Suite.
Keep this setting on, and play with zipped data in Burp Suite.
🤫🤫 You can change zipped data in req
Learned from @stokfredrik
#infosec #appsec #security #burp #bugbountytips #bugbountytip