Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/gosecure/burp-ntlm-challenge-decoder
Burp extension to decode NTLM SSP headers and extract domain/host information
https://github.com/gosecure/burp-ntlm-challenge-decoder
burp extension ntlm osint recon security ssp windows
Last synced: 8 days ago
JSON representation
Burp extension to decode NTLM SSP headers and extract domain/host information
- Host: GitHub
- URL: https://github.com/gosecure/burp-ntlm-challenge-decoder
- Owner: GoSecure
- Created: 2017-12-12T00:27:41.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2021-03-11T12:52:56.000Z (over 3 years ago)
- Last Synced: 2024-05-20T11:35:16.047Z (6 months ago)
- Topics: burp, extension, ntlm, osint, recon, security, ssp, windows
- Language: Kotlin
- Homepage: https://portswigger.net/bappstore/30d095e075e64a109b8d12fc8281b5e3
- Size: 2.93 MB
- Stars: 33
- Watchers: 7
- Forks: 11
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Burp NTLM Challenge Decoder
[![Build Status](https://travis-ci.org/GoSecure/burp-ntlm-challenge-decoder.svg?branch=master)](https://travis-ci.org/GoSecure/burp-ntlm-challenge-decoder)
![Burp SSP Decoder](/images/version_finale.gif)
Burp extension to decode NTLM SSP headers. NTLM challenges over HTTP allows us to decode interesting information about a server, such as:
- The server's hostname
- The server's operating system
- The server's timestamp
- The domain's name
- The domain's FQDN
- The parent domain's name# Build the plugin
`$ gradle build`
The compiled plugin is located at `build/libs/burp-ntlm-challenge-decoder.jar`
[Download the precompiled jar](release/burp-ntlm-challenge-decoder.jar)
# Sources, credits
- https://winprotocoldoc.blob.core.windows.net/productionwindowsarchives/MS-NLMP/[MS-NLMP].pdf
- http://msdn.microsoft.com/en-us/library/cc236621.aspx
- https://gist.github.com/aseering/829a2270b72345a1dc42