Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/righettod/virtualhost-payload-generator
BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolution.
https://github.com/righettod/virtualhost-payload-generator
burp-extensions pentesting web
Last synced: 2 months ago
JSON representation
BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolution.
- Host: GitHub
- URL: https://github.com/righettod/virtualhost-payload-generator
- Owner: righettod
- License: gpl-3.0
- Archived: true
- Created: 2017-09-16T09:20:47.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2017-10-08T07:11:00.000Z (over 7 years ago)
- Last Synced: 2024-08-02T00:23:09.076Z (6 months ago)
- Topics: burp-extensions, pentesting, web
- Language: Java
- Size: 184 KB
- Stars: 61
- Watchers: 9
- Forks: 14
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-burp-extensions - Virtual Host Payload Generator - Burp extension providing a set of values for the HTTP request Host header for the Burp Intruder in order to abuse virtual host resolution. (Payload Generators and Fuzzers / SSRF)
README
[![Build Status](https://travis-ci.org/righettod/virtualhost-payload-generator.svg?branch=master)](https://travis-ci.org/righettod/virtualhost-payload-generator)
[![Coverity Status](https://scan.coverity.com/projects/13781/badge.svg)](https://scan.coverity.com/projects/righettod-virtualhost-payload-generator)# Virtual Host Payload Generator
Burp extension providing a set of values for the HTTP request **Host** header for the *Burp Intruder* in order to abuse virtual host resolution.
It's based on the information provided by this article from the Burp team: [Cracking the Lens: Targeting HTTP's Hidden Attack-Surface ](http://blog.portswigger.net/2017/07/cracking-lens-targeting-https-hidden.html)
The idea of the extension is to use the Burp Intruder in order to identify different responses when Host header is abused and then find an potential attack surface.
# Usage
**Step 1**: Send a request to the Intruder then set a placeholder on the **Host** header and replace the relative URL by the absolute version of the URL on the first line:
![Step1](tuto1.png)
**Step 2**: Select the **Payload Sets** from an **Extension-generated** type and select the **Host headers** extension payload generator.
Do not forget to uncheck the **Payload Encoding** option:
![Step2](tuto2.png)
![Step3](tuto3.png)
**Step 3**: Launch the attack, you can ignore the warning `The Host header in the request does not match the specified target host` because it's normal in our execution context.
You will see the different responses code, content and size according to the **Host** header value used as payload:
![Step4](tuto4.png)
# Payloads
Payload are stored in the properties file named **virtualhost-payload-generator-config.properties**, precisely in the following key:
```
# List (separated by a comma) of the host names to use
# Ports list will be generated from 1 -> 65535
host.header.names=localhost,127.0.0.1,intranet,proxy,mail,exchange,ad,fw,reverse-proxy
```# Build the extension
The extension is developed using IntelliJ IDEA Community Edition.
Use the following Maven command `mvn clean package`.
The extension will be available, as a jar file, in the **target** folder.