Skip to content

Symbolexe/OWNBURP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OWNBURP

Screenshot 2024-06-26 121146

step-by-step guide

JWT Manipulation Tool

Setup and Configuration:

Install the Extension:

  1. Save the script as JWTManipulationTool.py.
  2. Open Burp Suite and navigate to the "Extender" tab.
  3. Click on the "Extensions" tab and then the "Add" button.
  4. Select "Python" as the extension type and load JWTManipulationTool.py.

Using the Extension:

  1. Navigate to the "JWT Manipulation" tab that appears.
  2. You'll see the UI components for encoding, decoding, signing, and verifying JWTs.
  3. Detailed Example for Each Functionality:
  4. Decoding a JWT

Scenario:

You have intercepted a JWT in a request and want to decode it to see its contents.

Steps:

Intercept the Request:
  • Use Burp Suite's proxy to intercept a request containing a JWT.
  • For example, the JWT might be in the Authorization header or a request parameter.
  • Copy the JWT value (e.g., eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c).
Decode the JWT:
  • Navigate to the "JWT Manipulation" tab.
  • Paste the JWT into the "JWT" field.
  • Click the "Decode JWT" button.
  • The tool will display the decoded header, payload, and signature in a message box.
Analyze the Decoded JWT:
  1. Review the decoded header and payload for sensitive information.
  2. For example, the payload might contain user information such as {"sub": "1234567890", "name": "John Doe", "iat": 1516239022}.

Encoding a New JWT

Scenario:

You want to create a new JWT with specific claims.

Steps:
Enter Header and Payload:
  • Navigate to the "JWT Manipulation" tab.
  • Enter the desired header in JSON format. For example: {"alg": "HS256", "typ": "JWT"}.
  • Enter the desired payload in JSON format. For example: {"sub": "1234567890", "name": "Jane Doe", "iat": 1516239022}.
Enter the Secret:
  • Enter the secret key that will be used to sign the JWT. For example: your-256-bit-secret.
Encode the JWT:
  • Click the "Encode JWT" button.
  • The tool will display the encoded JWT in a message box. For example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkphbmUgRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.4t9_JLZdx1Jd_wVtG9Gy_GcnmfsAsys_8Q1Z8uN9h6E.
Use the JWT:
  1. Copy the encoded JWT and use it in your testing scenarios, such as modifying a request in Burp Suite.
  2. Signing a JWT
Scenario:

You have a JWT with a modified payload and need to re-sign it.

Steps:
Modify the Payload:
  • Decode the JWT using the steps described above.
  • Modify the payload as needed. For example, change the name claim to {"sub": "1234567890", "name": "Jane Smith", "iat": 1516239022}.
  • Encode the modified JWT without a signature.
Sign the JWT:
  • Navigate to the "JWT Manipulation" tab.
  • Paste the modified JWT into the "JWT" field.
  • Enter the secret key used for signing. For example: your-256-bit-secret.
  • Select the signing algorithm (e.g., HS256).
  • Click the "Sign JWT" button.

The tool will display the new signed JWT in a message box. For example: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkphbmUgU21pdGgiLCJpYXQiOjE1MTYyMzkwMjJ9.nGOW-U6x-SiJxFzR_ZKJPPv3XeJXmn5vEkVVi0VDibQ.

Use the JWT:
  1. Copy the signed JWT and use it in your testing scenarios.
  2. Verifying a JWT
Scenario:

You want to verify the validity of a JWT.

Steps:
  1. Obtain the JWT:
  • Capture the JWT you want to verify from an intercepted request.
  1. Verify the JWT:
  • Navigate to the "JWT Manipulation" tab.
  • Paste the JWT into the "JWT" field.
  • Enter the secret key used for signing. For example: your-256-bit-secret.
  • Select the signing algorithm (e.g., HS256).
  • Click the "Verify JWT" button.

The tool will display a message indicating whether the JWT is valid or invalid.

Using in Real-World Testing:
  1. Intercept JWT Traffic:
  • Use Burp Suite to capture traffic containing JWTs.
  1. Decode and Analyze:
  • Decode the JWT to inspect the claims and ensure they don’t contain sensitive information.
  1. Modify and Test:
  • Modify the JWT payload to test authorization and authentication mechanisms.
  1. Encode and Sign:
  • Create new JWTs with specific claims and sign them for testing purposes.
  1. Verify Validity:
  • Ensure JWTs are correctly signed and valid before using them in requests.

Hidden Parameters Detector

Setup and Configuration:

Install the Extension:

  1. Save the script as Hidden-Parameters.py.
  2. Open Burp Suite and navigate to the "Extender" tab.
  3. Click on the "Extensions" tab and then the "Add" button.
  4. Select "Python" as the extension type and load Hidden-Parameters.py.

Using the Extension:

  1. After loading, navigate to the "Hidden Params Detector" tab.
  2. The tool will automatically start checking responses for hidden parameters.

Interpreting the Results:

  • The output will list detected hidden parameters in HTTP responses.
  • Parameters will be highlighted, and relevant issues will be logged.
  • Steps in Real-World Use:

Perform a normal web application scan using Burp Suite.

  • Monitor the "Hidden Params Detector" tab for any detected hidden parameters.
  • Investigate highlighted parameters to understand their purpose and potential security implications.

Data Leak Prevention Tool

Setup and Configuration:

Install the Extension:

  1. Save the script as DataLeak.py.
  2. Open Burp Suite and navigate to the "Extender" tab.
  3. Click on the "Extensions" tab and then the "Add" button.
  4. Select "Python" as the extension type and load DataLeak.py.

Using the Extension:

  • Navigate to the "Data Leak Prevention" tab that appears.
  • Optionally load additional patterns by clicking the "Load Patterns" button and selecting a file with regex patterns.
  • Perform web application testing as usual.

Interpreting the Results:

  • The tool will analyze HTTP responses for predefined patterns (e.g., SSNs, credit card numbers).
  • Detected data leaks will be displayed in the text area with the pattern that matched.

Steps in Real-World Use:

  1. Configure the tool with additional patterns if necessary.
  2. Perform web application testing.
  3. Monitor the "Data Leak Prevention" tab for any detected data leaks.
  4. Address any found issues by reviewing and fixing the code or configuration that leaks sensitive data.

Common Real-World Workflow:

Preparation:

  • Identify the target domains and applications.
  • Load all necessary extensions in Burp Suite.

Scanning and Testing:

  • Use Burp Suite’s proxy to intercept and examine traffic.
  • Let the extensions run their checks in the background.

Analysis:

  • Review the output from each extension tab.
  • Document and prioritize the issues based on severity.

Remediation:

  • Fix identified issues in the application code or configuration.
  • Re-test to ensure issues are resolved.