Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/summitt/Nope-Proxy
TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.
https://github.com/summitt/Nope-Proxy
appsec appsecurity burp-extensions burp-plugin burpsuite burpsuite-extender hacking mitmproxy pentesting protobuf proxy tcp tcpproxy udp updproxy websockets
Last synced: 23 days ago
JSON representation
TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite.
- Host: GitHub
- URL: https://github.com/summitt/Nope-Proxy
- Owner: summitt
- Created: 2016-05-23T20:30:34.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2024-05-25T16:08:59.000Z (7 months ago)
- Last Synced: 2024-10-29T16:58:10.756Z (about 1 month ago)
- Topics: appsec, appsecurity, burp-extensions, burp-plugin, burpsuite, burpsuite-extender, hacking, mitmproxy, pentesting, protobuf, proxy, tcp, tcpproxy, udp, updproxy, websockets
- Language: Java
- Homepage:
- Size: 1.22 MB
- Stars: 1,556
- Watchers: 59
- Forks: 236
- Open Issues: 16
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
Awesome Lists containing this project
- awesome-hacking-lists - summitt/Nope-Proxy - TCP/UDP Non-HTTP Proxy Extension (NoPE) for Burp Suite. (Java)
README
# NoPE Proxy
![GitHub last commit](https://img.shields.io/github/last-commit/factionsecurity/faction) ![GitHub Release Date - Published_At](https://img.shields.io/github/release-date/factionsecurity/faction)[![](https://img.shields.io/badge/null0perat0r-it?style=flat-square&logo=mastodon&labelColor=white&color=white&link=https%3A%2F%2Finfosec.exchange%2F%40null0perat0r)](https://infosec.exchange/@null0perat0r)
[![](https://img.shields.io/twitter/follow/null0perar0r)](https://twitter.com/intent/follow?screen_name=null0perar0r)### A TCP/UDP Non-HTTP Proxy Extension for Burp Suite
### [Download Latest Release Here](https://github.com/summitt/Burp-Non-HTTP-Extension/releases)
### [Manual and Guides Here](https://github.com/summitt/Burp-Non-HTTP-Extension/wiki)
### [Community Nope Scripts](https://github.com/summitt/Nope-Proxy-Scripts)
### [Support](https://github.com/sponsors/factionsecurity)
## Introduction
This burp extension adds three main features to BurpSuite.
1. Interceptors for TCP and UDP traffic.
2. A configurable DNS server. This will route all DNS requests to Burp or preconfigured hosts. It makes it easier to send mobile or thick client traffic to Burp. You need to create invisible proxy listeners in BurpSuite for the Burp to intercept HTTP traffic or you can use the second feature of this extension to intercept binary/non-http protocols.
3. A Non-HTTP MiTM Intercepting proxy. This extension allows you to create multiple listening ports that can MiTM server side services. It also uses Burp's CA cert so that if the browser or mobile device is already configured to access SSL/TLS requests using this cert then the encrypted binary protocols will be able to connect without generating errors too. It also provides the ability to automatically match and replace hex or strings as they pass through the proxy or you can use custom python code to manipulate the traffic.
![](http://imgur.com/X6xYsq8.png)## DNS Server Configuration
![](http://imgur.com/0ezoO7f.png)
The DNS server configuration allows granular control over your DNS settings. You can configure it to send all traffic to the same IP address as Burp or you can use a Custom Hosts File to configure only some hosts to be forward to Burp while others can be forwarded to other hosts. It can also be confgured to send all requests to the real IP unless specified in the custom hosts file.
The DNS server automatically starts with the IP address of the last interface you set in the Interface input box. Changing the interface number will automatically change the IP address. The server will need to be restarted for this change to take effect.
The Custom Hosts File is not related at all to your normal hosts file and will over ride it. If the ‘Use DNS Response IP’ checkbos is checked (default) then the extension will resolve all hosts not in the Custom hosts file to which ever IP address is set in the ‘DNS Response IP’ input box. If this box is not checked then the extension will resolve the Real IP address unless it has been overridden in the ‘Custom Hosts File’## Port Monitoring
Nope Proxy has a port monitor that will only display tcp and udp ports that a remote client is attempting to connect on. This combined with the DNS history can help you find which hosts and ports a mobile app or thin client is attempting to contact so that you can create interceptors for this traffic and proxy it to the real servers.## Non-HTTP MiTM proxy
![](http://imgur.com/oCHMjuH.png)
This non-HTTP proxy has several features built in.
- All requests and responses are saved to a sqlite database and can be exported or imported into the tool.
- Automatic Match and Replace Rules that are customizable based on the direction of traffic. (Client to Server, Server to Client, or Both.
- Match and replace rules support both hex and string replacement.
- Manual Interception binary protocols and change them before sending them back to the server or client. Just like the normal Burp proxy but with binary streams.
- Python Code can be used instead of the normal Match and Replace Rules for more advancing mangling of requests and responses.
- Use python code to reformat requests in history without changing outgoing or incomming requests. (e.g. Convert protobuf to JSON or human readable formats without modifying the incomming or outgoing traffic)
## TCP/UDP Repeater
![](http://imgur.com/aNpzAdz.png)
- TCP/UDP repeater can be used to replay requests to the client or server on the currently connected socket streams.
- Code Playground allows you to create a custom python payload based on the request currently displayed in the repeater.
- Search TCP/UDP proxy history## Configure the proxies
![](http://imgur.com/WdsB32L.png)
To perform normal intercepting of binary traffic of applications you can set the DNS IP address to the extension’s IP address and then create a Listener Under ‘Server Config’. This requires that you know the hostname and Port the application is trying to connect. You can switch to the ‘DNS History’ Tab to view the DNS queries and ports that are trying to connect to you. You could also run wireshark but Nope will filter this information for you.
Once you know the right host name and port you can configure these settings as shown above. If the service is using SSL then you need to export burp’s CA cert to the same folder that Burp is running out of for the extension to find it and generate certs that will pass certificate verification. Then you can check the SSL check box before adding the proxy.
The proxy does not start until ‘enable’ is checked in the table.
Once the proxy is started you can intercept it in real time. All your traffic will be logged into the TCP History Tab and stored locally in a sqlite database. The database can be exported or imported from the Server Configuration Tab. In addition, if Burp crashes or you close burp without saving the TCP History it will still be automatically loaded when you start Burp.
## Manual Intercept Traffic
![](http://imgur.com/X6xYsq8.png)
Clicking on the TCP Intercept Tab will allow to enable and disable Manual Intercepting. This will be very similar to intercepting HTTP traffic with burp. If the data sent is just strings then it’s very simple to just replace text or attempt modification to the request. If the application is sending serialized objects or protobuffs then you will need to switch between Raw and Hex mode to ensure the data is encoded correctly and length checks are correct.## Automated Manipulation of Traffic
Once you have your ideal payload you can automatically match and replace in the Automation Tab.
![](http://imgur.com/CBRQVIo.png)If the ‘Enable Python Manger’ is left uncheck (default) then the Match and Replace Rules are used. It supports both hex, string, and directional replacement. The ‘#’ can be used to comment out a line and rules are updated as soon as you press a single key.
If you want to replace the string ‘test’ with ‘hacked’ then you could use the following rule:
```
test||hacked
```
This will affect traffic in both directions. You could make it serve to client only by using the following rule:
```
test||hacked||c2sOnly
```
You could also perform the same replacement as hex using the following rule:
```
0x74657374||6861636B6565||c2sOnly
```## Python Mangler
The previous example is great for quickly fuzzing the request but more complicated examples may require actual coding. The Python Mangler was built to provide far more control of the requests and responses. You can import a library to extract the data into a more easily editable form and covert it back before sending to the server. The PyManger must have at the minimum the following structure.You can download community [Nope Scripts here](https://github.com/summitt/Nope-Proxy-Scripts)
```
def mangle(input, isC2S):
return input
```
The ‘input’ variable is a byte array, the ‘isC2S’ variable is a Boolean value, and the output must also be a byte array (though python seems somewhat forgiving here). This will allow directional specifying changes the traffic.
Using PyMangler you can perform the same rule change above by writing the following code.
```
def mangle(input, isC2S):
if isC2S:
input = input.replace(‘test’,’hacked’)
return input
```
You can import external libraries, create classes, and do anything you can do in normal python as long as there is a ‘mangle’ function with the same inputs to process the traffic. If you import custom classes they will need to be placed in the same folder that is running BurpSuite unless they are in your path.## Python Pre and Post Interceptor Functions
You can use the pre and post interceptors do all kinds of things with the stream. I was originally created to allow converting streams to a more human readable format before sending the data to the interceptor. Once modified in the interceptor the postInterceptor can convert it back to the binary stream.```
def preIntercept(input,isC2S):
return input
def postIntercept(input,isC2S):
return input
```Below is an example of a server that is sending protobuf messages. Notice the stream would be difficult to modify by hand.
![](NonHTTPProxy/screenshots/PreFormat.PNG)
Now we use the pre and post interceptor functions to make it easier to modify in transit. Notice the python console on the Right will display in 'print' statements as well as errors in your python code when it runs. *Note that if the functions fail the NoPE proxy will send the original paylaods and ignore any changes to the stream you made.*
![](NonHTTPProxy/screenshots/PythonConsole.PNG)
Below is an example of the now Human Readable and Editable Protobufs.
![](NonHTTPProxy/screenshots/Post%20Format.PNG)A
## Highlighting Traffic
You can select mutliple requests and responses and highlight them with custom colors. You can even search only highlighted items. This makes is easy to find interesting requests later that you might want to dig into further.
![image](https://github.com/summitt/Nope-Proxy/assets/2343831/ee6d6f98-6f9b-4644-8fa3-5573c058ee7c)### Upcomming features
- UDP repeater
- Switches in the python manger for TCP or UDP request only modification
- Ability to decrypted encrypted UDP traffic like QUIC and other protocols
- Ability to auto sense encrypted traffic so it can better decode XMPP, SSH, SFTP, etc.## Check out my other project, Faction: pentesting collaboration framework
[https://github.com/factionsecurity/faction](https://github.com/factionsecurity/faction)
[https://docs.factionsecurity.com/](https://docs.factionsecurity.com/)
[https://www.factionsecurity.com/](https://www.factionsecurity.com/)