Cатсн²² (in)sесuяitу / ChrisJohnRiley

Because we're damned if we do, and we're damned if we don't!

Tag Archives: burp

Burp Extension – Scanner Streamer

Much like everybody else, I was really looking forward to the new Burp 1.5 professional release and the new Extensions… now that there’s some API documentation and example code out their, I had a little play to see what was possible.

As I had limited time, I played a little with the IScannerListener API to get a feel for things. Although the API is still in draft, there are lots of things in place and it’s definitely more than usable in most situations. There are still some points I’d like to see improved in newer releases (or explained better), but for a .01 release I’m already in love with the possibilities  Hopefully I’ll have some time to rewrite the UAtester tool to work as a Burp Extension of the next few months.

Until then, I’ve thrown together a quick (very quick) extension to display newly discovered scanner findings in the output console. Nothing you can’t already do, but useful to have open in an external window as you browse a site or run manual tests.


Yeah… ASCII art is old skool cool 😉

The current script will output new findings on anything you have in-scope. The script will automatically skip displaying findings types that have already been displayed for the host (to avoid flooding the output with the same findings again and again). you can alter this setting and set it to work on all hosts (not just in-scope) within the .py file itself.


As I said, this is only something I was playing with… but still, let me know what you think 😉


New Burp suite

The Blog over at blog.portswigger.net has been buzzing for the last month about the new version of Burp Suite. After a short time in beta testing (with users of the professional version) it’s been released for those using the free version. I’ve had a quick look over the features and think that version 1.2 is a big step in the right direction.

I’ve flitted backwards between using OWASP’s Webscarab, and Burp Suite. As much as I’ve always wanted to go the free route and use Webscarab, something kept pulling me back to Burp. I guess it just makes things easier. The new version seems to fill in some gaps, and I’ll be looking at the pro license soon to really get the full benefit.

The professional version includes the new burp scanner (passive and active scanning) seems to fill a void a lot of people have been looking for. i.e. an affordable web-application scanner that actually works. No automated scan will find everything, but users of Burp suite already know that. so the addition of a scanner just seems to make sense at this point. One thing I wish was in the free version however was the save/restore session function. Then again, I can see why this is held back for the paying customers.

Some of the new features include .:

  • Site map showing information accumulated about target applications in tree and table form
  • Fully fledged web vulnerability scanner [Pro version only]
  • Suite-level target scope configuration, driving numerous individual tool actions
  • Display filters on site map and Proxy request history
  • Ability to save and restore state [Pro version only]
  • Suite-wide search function
  • Support for invisible proxying

Checkout the full details at www.portswigger.net