This extension complements Burp's active scanner by using a novel approach capable of finding and confirming both known and unknown classes of server-side injection vulnerabilities. Evolved from classic manual techniques, this approach reaps many of the benefits of manual testing including casual WAF evasion, a tiny network footprint, and flexibility in the face of input filtering.
For more information, please refer to the whitepaper at http://blog.portswigger.net/2016/11/backslash-powered-scanning-hunting.html
The code can be found at https://github.com/portswigger/backslash-powered-scanner Contributions and feature requests are welcome.
- Add MD5/SHA-1 lax comparison to magic value attacks
- Misc bugfixes
- Add 'COM1' Windows reserved filename to magic value attacks
- Support custom magic value attacks
- Don't attempt filepath related attacks in the request path
- Provide a configuration dialog
- Detect alternative code paths triggered by keywords like 'null', 'undefined' etc
- Detect JSON Injection and escalate into RCE where possible
- Detect Server-Side HTTP Parameter Pollution
- Support bruteforcing backend parameter names
- Improve evidence clarity and reduce false positives
- Find vulnerabilities with subtler evidence
- Detect escape sequence injection
- Improve LFI detection
- Misc tweaks, bugfixes and efficiency improvements
- First public release
This extension requires Burp Suite Pro 1.7.10 or later. To install it, simply use the BApps tab in Burp.
If you want to manually build/install it from source, you'll need to add the following JAR to your libraries: https://commons.apache.org/proper/commons-lang/download_lang.cgi