How To Burp David Brown



Similar documents
Pentesting With Burp Suite Taking the web back from automated scanners

HackPra. Burp Pro: Real-life tips & tricks

Managing Qualys Scanners

Cyber Security Challenge Australia 2014

EVALUATING COMMERCIAL WEB APPLICATION SECURITY. By Aaron Parke

Conducting Web Application Pentests. From Scoping to Report For Education Purposes Only

Lecture 11 Web Application Security (part 1)

(WAPT) Web Application Penetration Testing

Bust a cap in a web app with OWASP ZAP

HP WebInspect Tutorial

Web Application Penetration Testing

Web Application Vulnerability Testing with Nessus

Chapter 1 Web Application (In)security 1

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

Web Application Security

Vulnerability Assessment and Penetration Testing

HackMiami Web Application Scanner 2013 PwnOff

E M A I L S E T - U P G U I D E

STABLE & SECURE BANK lab writeup. Page 1 of 21

Improving Web Vulnerability Scanning. Daniel Zulla

Guidelines for Web applications protection with dedicated Web Application Firewall

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

Using Free Tools To Test Web Application Security

Information Security. Training

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

Bug Report. Date: March 19, 2011 Reporter: Chris Jarabek

Using Foundstone CookieDigger to Analyze Web Session Management

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL.

Cyber Security Workshop Ethical Web Hacking

Adobe Systems Incorporated

Using Nessus In Web Application Vulnerability Assessments

Secure Web Development Teaching Modules 1. Security Testing. 1.1 Security Practices for Software Verification

Penetration Testing Walkthrough

Certified The Grinder Testing Professional VS-1165

Attack and Penetration Testing 101

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

What is the Barracuda SSL VPN Server Agent?

Penetration Testing with Kali Linux

SOA Software: Troubleshooting Guide for Agents

Web application security: Testing for vulnerabilities

Crawl Proxy Installation and Configuration Guide

Web Tracking for You. Gregory Fleischer

Evaluation of Penetration Testing Software. Research

mitmproxy.org How MITMproxy has been slaying SSL Dragons OWASP The OWASP Foundation

CumuLogic Load Balancer Overview Guide. March CumuLogic Load Balancer Overview Guide 1

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Elluminate Live! Access Guide. Page 1 of 7

Administering Jive for Outlook

Configuring iplanet 6.0 Web Server For SSL and non-ssl Redirect

GoToMyPC Corporate Advanced Firewall Support Features

Application Security Testing

User Guide. You will be presented with a login screen which will ask you for your username and password.

Web Security Testing Cookbook*

Startup guide for Zimonitor

Firewall Design Principles Firewall Characteristics Types of Firewalls

Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.

DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Fusion Middleware Identity Management 11gR1

IPSL - PRODIGUER. Messaging Platform Design

Web Application Firewall

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Phone Inventory 1.0 (1000) Installation and Administration Guide

Project X Mass interception of encrypted connections

Cross Site Scripting in Joomla Acajoom Component

ECE 4893: Internetwork Security Lab 12: Web Security

Configuring Nex-Gen Web Load Balancer

An Insight into Cookie Security

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

IBM Security QRadar Version Vulnerability Assessment Configuration Guide IBM

Opacus Outlook Addin v3.x User Guide

Contents Release Notes System Requirements Administering Jive for Office

Background Deployment 3.1 (1003) Installation and Administration Guide

Proof of Concept. A New Data Validation Technique for Microsoft ASP.NET Web Applications. Foundstone Professional Services

Introduction to Mobile Access Gateway Installation

A Guide to New Features in Propalms OneGate 4.0

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with the Oracle Fusion Middleware SOA Suite 11gR1

Barracuda Web Application Firewall vs. Intrusion Prevention Systems (IPS) Whitepaper

Elluminate Live! Access Guide. Page 1 of 7

WHY ATTACKER TOOLSETS DO WHAT THEY DO

Application security testing: Protecting your application and data

Citrix Receiver for Mobile Devices Troubleshooting Guide

Using SAML for Single Sign-On in the SOA Software Platform

April 11, (Revision 2)

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

Introduction. How does FTP work?

SkyFoundry News Update New Reporting Features and SkySpark Mobile

Network Technologies

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS

Konica Minolta s Optimised Print Services (OPS)

SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

Ethical Hacking as a Professional Penetration Testing Technique

Configuration Worksheets for Oracle WebCenter Ensemble 10.3

Check list for web developers

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Transcription:

How To Burp David Brown Senior Security Engineer Security Innovation

In case you want to follow along https://portswigger.net/burp/download.html

What is Burp? An HTTP Proxy and other things Built by lazy Security Engineers for other lazy Security Engineers Extremely Configurable Know how to program? Also Extensible Not Metasploit

What is it not? An automated security tool Not the bad kind anyway Open Source Pro features are nice and you probably want them $350.00/user/year Always Intuitive Sniper, Battering Ram, Pitchfork, Cluster Bomb Risk Free Don t underestimate it

Suite Overview Target/Scoping mechanism HTTP(S) Proxy Spidering Engine Active & Passive Scanners Configurable Automation Engine Manual Request Constructor Entropy Analysis Engine Decoding/Encoding Utility HTTP Request/Response Diff Tool Plugin Architecture w/ Open API s

Demo Time!

Target Site Map If Burp saw it, it will be listed here Probably Just keep looking, I m sure it s in there somewhere Scope (USE IT) Fun fact: I didn t know about this tab for a year Highly configurable Host, Domain, Port, Regex, etc

Proxy Intercept Very occasionally, it s nice to be able to intercept things in transit HTTP History The glue holding the Suite together Fun Fact: 375 The number of requests a recent target made Before I clicked anything

Proxy Options CA Certificates Burp issues it s own CA certificates Usually just works but can get complicated e.g. Certificate Pinning, HSTS, Pre-Load Lists, etc Match/Replace An especially powerful but overlooked feature Allows arbitrary replacement of values in requests or responses based on arbitrary criteria e.g. min.js ->.js

Demo Time!

Spider Configurable web crawler Fun Fact: The Spider queue auto-populates with requests! Fun Fact: Certain requests can be destructive! e.g. The "Delete Everything" button that ended up in the Admin Console for some reason

Scanner Live Scanning By default Burp passively scans all requests Active Scanning is not where Burp shines Passive Scanning Active Scanning Live Scanner Low Hanging Fruit! No. Stop. Just don t. Manual Scanner Sure, why not! Malicious Packets!

Intruder Hands down, most powerful tool in the suite Replace most anything in a request or response with most anything else Useful in all sorts of attacks Account Enumeration Identification of SQLi or XSS Fuzzing request handling FuzzDB/SecLists ++

Demo Time!

Repeater Good exploration tool Ctrl-R works on almost any request in the Suite Most of the interesting discoveries I make in Burp come out of the Repeater

Sequencer Kind of a one trick pony If you were wondering how much entropy something has Now you have an objective way to find out Useful for when auditing FIPS requirements Confidence level increases with number of requests (max: 20000)

Decoder Does what it says on the can Encode or Decode an arbitrary string as many times as you desire Least mature tool of the suite Honestly I m not sure why it s still so bad Is admittedly convenient when the need to multiply decode something arises

Comparer I ve almost never used this tool Maybe I m not the target audience? Simple diff tool for comparing requests or responses

Extender Plugin architecture for Burp Fortunately (or unfortunately) extensions can be written in most languages Java, Python, Jython and Ruby are popular The relatively new BApp Store allows in-suite installation for the more mature extensions Many are open source and available online

Handy Extensions Some particularly useful extensions Logger++ Useful when recording exactly what was done in an production environment during testing Extremely useful if said testing in production results in an unpleasant outcome JSON Decoder Parsing through unbeautified json blobs tends to get old after a while Browser Repeater Sometimes the burp rendering engine isn't enough (e.g. reflected xss that relies on a specific browser...ie9 and ASP.Net 3.5) Headers Analyzer There have been few, if any, web applications I've assessed that didn't have at least one misconfigured response header WSDL er Uses SoapUI Core but wraps it in a very useful plugin that auto-builds the request structure for a given host/service definition. Very useful for fuzzing.

Demo Time!

Burp Suite Options Proxy settings If a target requires a proxy to reach, you can define it as an upstream proxy Hostname Resolution Acts as a hosts file within burp for redirecting all requests for a given host SSL Allows granular definition for all SSL/TLS versions and cipher suites Client / Host SSL Certificates If a client and host require mutual cert-based authentication, that can be defined here Session Handling / Cookie Jar Just like a browser, Burp maintains its own cookie store

Burp State Pro version? Persist the full state of the suite Super useful when a client inevitably asks questions like Did you or did you not send a request to our service asking webroot to delete itself? Free version? Logger++ Built in Remember Tool Configuration

Additional Resources Burp Suite Download Page: https://portswigger.net/burp/download.html Full Documentation: https://portswigger.net/burp/help/contents.html Web Application Hacker's Handbook: http://www.amazon.com/gp/product/1118026470?ie=utf8&tag= portswinet- 20&linkCode=as2&camp=1789&creative=9325&creativeASIN=111 8026470 Wordlists Compiled lists of payloads, passwords, usernames, etc.: https://github.com/danielmiessler/seclists

Questions? Complaints? David Brown Senior Security Engineer Security Innovation dbrown@securityinnovation.com