Burp Suite User Forum
For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.
Found 50 posts in 50 threads
Accept-Language: en-CA,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded … ; charset=UTF-8
Content-Length: 67
Origin: https://www.XXXX.ca
DNT: 1
Connection: keep-alive
Referer … s_vnum=15...%3D5; AMCVS_37...%40AdobeOrg=1; check=true; wz_svgmcv_idnum=92...92_5; s_cc=true; AWSELB=67 … Accept-Language: en-CA,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded … ; charset=UTF-8
Content-Length: 67
Origin: https://www.XXXX.ca
DNT: 1
Connection: close
Referer:
%54%7a%6f%30%4f%69%4a%56%63%32%56%79%49%6a%6f%79%4f%6e%74%7a%4f%6a%67%36%49%6e%56%7a%5a%58%4a%75%59%57% … 74%39
Internal Server Error
PHP Fatal error: Uncaught Exception: unserialize() failed in /var/www … /index.php:4 Stack trace: #0 {main} thrown in /var/www/index.php on line 4
??
is that, by default, any content typed into the address bar is immediately submitted to Google as a search … While this is expected behavior for Chromium and can be disabled by removing all search engines in the
The request for "Confirming TE.CL vulnerabilities using differential responses" is given as
"POST /search … Content-Length: 146
x=
0
POST /search HTTP/1.1
Host: vulnerable-website.com
Content-Type: … application/x-www-form-urlencoded
Content-Length: 11
q=smuggling". … Content-Length: 146
x=POST /search HTTP/1.1
Host: vulnerable-website.com
Content-Type: application … /x-www-form-urlencoded
Content-Length: 11
q=smuggling".
103.0.5060.134 Safari/537.36, Connection: close, Cache-Control: max-age=0, Content-Type: application/x-www-form-urlencoded … , Content-Length: 67]
<type 'java.util.ArrayList'>
the value is the same in updatedheader and
Connection: close
Cookie: session=%54%7a%6f%30%4f%69%4a%56%63%32%56%79%49%6a%6f%79%4f%6e%74%7a%4f%6a%67% … this -
Internal Server Error
PHP Fatal error: Uncaught Exception: unserialize() failed in /var/www … /index.php:4 Stack trace: #0 {main} thrown in /var/www/index.php on line 4.
POST /dz588q90/xhr/api/v2/collector/beacon HTTP/1.1
Host: www.---------.com
Origin: http://example.com … : */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded … Content-Length: 1410
Origin: https://www.--------.com
Connection: close
Referer: https://www.realself.com … /search?
The blog posts you mention are all first page search engine results. … Including 2nd, 3rd, ... pages from different engines.
the heading "Confirming TE.CL vulnerabilities using differential responses" reads as below:
POST /search … HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
Content-Length … Transfer-Encoding: chunked
7c
GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
For example i want to send this request to Confirming TE.CL vulnerabilities:
POST /search HTTP/1.1 … Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
Content-Length: 4
Transfer-Encoding … : chunked
7c
GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
for example :
POST /search HTTP/1.1
Host: normal-website.com
Content-Type: application/x-www-form-urlencoded
response portion starts with a POST request without a body and then smuggles a GET request:
POST /search … HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
Content-Length … Transfer-Encoding: chunked
7c
GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded … The HTTP Request Smuggler identifies two requests that are subject to smuggling:
POST /search HTTP … For example if I want to smuggle the following request my prefix variable is set to:
'''POST /search
LABS: Reflected XSS into HTML context with all tags blocked except custom ones
No parameter 'search
Cookie: session=**************; csrfKey=*************************
Content-Type: application/x-www-form-urlencoded … session=*******************; csrfKey=<<"obtained CSRF cookie HERE">>
Content-Type: application/x-www-form-urlencoded … Went back to the original browser, performed a search from the wiener's page and sent the resulting request … search=hat HTTP/2
Host: LAB_ID.web-security-academy.net
Cookie: session=****************; csrfKey … search=green%0d%0aSet-Cookie:%20csrfKey=YOUR-CSRF_COOKIE HTTP/2
Host: LAB_ID.web-security-academy.net
I would like to have a single search window and a possibility to perform multiple searches (and leave … Preferably with an option in the user options to enable or disable tabbed search.
Try using the "Search" tab to search for UTF encoding.
java 16.0.2 2021-07-20
Java(TM) SE Runtime Environment (build 16.0.2+7-67)
Java HotSpot(TM) 64-Bit … Server VM (build 16.0.2+7-67, mixed mode, sharing)
Burpsuite v2021.10.3
Edition Windows 10 Home
I can't find my old post and the search menu only let me go through all results from the beginning of
automate scans across multiple sites and launch those scans from a central location (with the scan engines
It would be great if we could integrate with our ticket, and continuous integration engines as well.
Howver, I'd deeply appreciate a Search feature in "Extender / BApp Store" (and possibly in the Web version
Searching for a particular string with "Target, Repeater, Proxy, and Organizer" all checked under "Tools". It is not returning the requests that contain that string which have a Source of "Proxy." However, if I uncheck...
POST / HTTP/1.1
Host: xxx-your-lab-id-xxx.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … It was the Repeater results in the Burp Search for "POST /" that eventually returned the API Key....wierd
We are planning to support multiple concurrent projects with different configs/engines within the same
Firefox 67 changes every URL from http: to https: and nothing works.
I'd like to have a way to have Burp Search extract all the values that match a certain regex or results … a regex, saving the items without Base64 encoding, opening the file in Sublime, and using its regex search
Would it be possible to add a grep value extractor, similar to what we have in intruder, to the overall search … I may search for all requests with a certain value, but want to be able to see that, or another value … in columns of the search window.
Hello,
It would be very useful if there is a tickbox in Burp->Search.
Locally I can use one of such engines from OpenJDK and run js code in the python. … understand javax imported from OpenJDK which place inside Burp and this OpenJDK does not contains any engines
Any explanation on why Virustotal thinks that the program is infected with Virus.
2 engines detected
It would be very useful to have a scan based on the OWASP Top 10 and a compliance report based on the
Hi guys!
I was thinking that it might be useful to be able to filter searches for HTTP verbs (e.g., only POST, only GET, etc.).
Thanks!
It would be really helpful to be able to specify proxy history searches to be limited to either requests or responses.
nested insertion points for the scanner which is great but it could be very handy to be able to make search … through nested values (ex: to search a string which is encoded in base64).
., Engine.THREADED or Engine.HTTP2 (Swapping request engines - https://portswigger.net/research/turbo-intruder-embracing-the-billion-request-attack
According to figures in Google search, there is it above the top of Results view, but It's not displayed
It implements custom checks to extend the capabilities of Burp's active and passive scanning engines.
Could you enhance search to cover UTF-8 characters as well?
I noticed there is a pre-defined shortcut for "Editor: Go to next search match", which is unfortunately
I'm currently using the latest stable version of the Windows Desktop version.
For some reason, whenever I'm trying to select a wordlist in Intruder or a session file, it doesn't work and all buttons loose all...
0x00007fc60e3e112c, pid=81701, tid=81702
#
# JRE version: OpenJDK Runtime Environment (16.0.2+7) (build 16.0.2+7-67 … )
# Java VM: OpenJDK 64-Bit Server VM (16.0.2+7-67, mixed mode, tiered, compressed oops, compressed
awesome, it would be even more awesome if it were possible, when searching for a string, to restrict the search
Hello dear portswigger team,
I have an issue using the Engagement Tools -> Search options. … Some times after entering the search word a suggestion window will be created as separate jwindow objects … (grey box and white box with digit 1 on the screenshot) and will not be killed after the search windows … That means that these additional windows are still open and running after closing the parent search window
don't mean to sound ignorant but I've been poking around the portswigger support site and can't find a search
In addition to that, a search feature for the tab names would be great, since it (quicly) becomes tedious … to search for a specific tab when you have 20, 30 or more tabs created.
Hi,
Quick question, I am trying to identify when performing a scan against a site if the OWASP Top … researching I found the following write up: https://portswigger.net/support/using-burp-to-test-for-the-owasp-top-ten
How about a search box that scans the names and description files to filter down the list.
request from the output tab and paste it into the repeater, then complete the 'Target' details on the top … "then complete the 'Target' details on the top right." … manually verify this using the Repeater, provided you uncheck the 'Update Content-Length' setting on the top … oc6ENALO7RzoOG4gf7nO3WuACjtMcBsv
Sec-WebSocket-Key: BFiL8g7xBMXsqpxcyoIZxg==
Content-Type: application/x-www-form-urlencoded … oc6ENALO7RzoOG4gf7nO3WuACjtMcBsv
Sec-WebSocket-Key: BFiL8g7xBMXsqpxcyoIZxg==
Content-Type: application/x-www-form-urlencoded
You could also try tuning the Spider and Scanner engines.
Hi, Many times I'm using Search from the Engagement tools. … I know I can use searching, but if I need to search for something in the request; which results in specific