Burp Suite User Forum
For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.
Found 50 posts in 50 threads
Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: */*
Accept-Language: en-CA,en-US … ;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate, br
Content-Type: application/x-www-form-urlencoded; … charset=UTF-8
Content-Length: 67
Origin: https://www.XXXX.ca
DNT: 1
Connection: keep-alive
Referer … Intel Mac OS X 10.15; rv:77.0) Gecko/20100101 Firefox/77.0
Accept: */*
Accept-Language: en-CA,en-US … ;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset
login/ HTTP/1.1, Host: localhost:8000, Accept-Encoding: gzip, deflate, Accept: */*, Accept-Language: en-US … 103.0.5060.134 Safari/537.36, Connection: close, Cache-Control: max-age=0, Content-Type: application/x-www-form-urlencoded … , Content-Length: 67]
<type 'java.util.ArrayList'>
the value is the same in updatedheader and
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US … Connection: close
Cookie: session=%54%7a%6f%30%4f%69%4a%56%63%32%56%79%49%6a%6f%79%4f%6e%74%7a%4f%6a%67% … this -
Internal Server Error
PHP Fatal error: Uncaught Exception: unserialize() failed in /var/www … /index.php:4 Stack trace: #0 {main} thrown in /var/www/index.php on line 4.
Hi Ian,
Unfortunately, we do not currently have a search function available on our forums. … Introducing a new search function for our forum, however, is currently being worked on by our website … In the meantime, whilst not being ideal, you could always try and perform your search via search engine … Alternatively, you can always email us directly at support@portswigger.net and we will try and assist
%54%7a%6f%30%4f%69%4a%56%63%32%56%79%49%6a%6f%79%4f%6e%74%7a%4f%6a%67%36%49%6e%56%7a%5a%58%4a%75%59%57% … 74%39
Internal Server Error
PHP Fatal error: Uncaught Exception: unserialize() failed in /var/www … /index.php:4 Stack trace: #0 {main} thrown in /var/www/index.php on line 4
??
POST /dz588q90/xhr/api/v2/collector/beacon HTTP/1.1
Host: www.---------.com
Origin: http://example.com … Mozilla/5.0 (Windows NT 6.1; rv:89.0) Gecko/20100101 Firefox/89.0
Accept: */*
Accept-Language: en-US … ,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length … : 1410
Origin: https://www.--------.com
Connection: close
Referer: https://www.realself.com/search
The request for "Confirming TE.CL vulnerabilities using differential responses" is given as
"POST /search … Content-Length: 146
x=
0
POST /search HTTP/1.1
Host: vulnerable-website.com
Content-Type: … application/x-www-form-urlencoded
Content-Length: 11
q=smuggling". … Content-Length: 146
x=POST /search HTTP/1.1
Host: vulnerable-website.com
Content-Type: application … /x-www-form-urlencoded
Content-Length: 11
q=smuggling".
Does regex engine in Burp support look-forward regex syntax? I can't get it to work. … Suppose I have a text
Cookie: xb=451079; localization=en-us%3Bcz%3Bcz; liqpw=1280; liqph=1173;
Now … =liqpw)
But I'm getting 0 search results.
But when updating to V2023.2 burpsuite, the scan engine is disabled.
The blog posts you mention are all first page search engine results.
In case someone else needs this at a later point in time and finds this via a Search Engine, just as
I can not see in the Intruder in the options pannel the Request Engine which enable us to change the
req
POST / HTTP/1.1
Host: example.com
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded … : 0
GET / HTTP/1.1
X: x
Turbo intruder script
def queueRequests(target, wordlists):
engine
web-security-academy.net
Cookie: session=mAbLimPqmVB5vNGU7notqlDu7ZCsW8O4
Content-Type: application/x-www-form-urlencoded … keep-alive
GET /admin HTTP/1.1
Host: localhost
def queueRequests(target, wordlists):
engine
the heading "Confirming TE.CL vulnerabilities using differential responses" reads as below:
POST /search … HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
Content-Length … Transfer-Encoding: chunked
7c
GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
For example i want to send this request to Confirming TE.CL vulnerabilities:
POST /search HTTP/1.1 … Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
Content-Length: 4
Transfer-Encoding … : chunked
7c
GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
I am using the below command to start my burp pro instance. Everytime I launch it burp launches with task execution paused. Is there a way to enable it by default?
command: java -jar burp.jar...
for example :
POST /search HTTP/1.1
Host: normal-website.com
Content-Type: application/x-www-form-urlencoded
response portion starts with a POST request without a body and then smuggles a GET request:
POST /search … HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
Content-Length … Transfer-Encoding: chunked
7c
GET /404 HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded … The HTTP Request Smuggler identifies two requests that are subject to smuggling:
POST /search HTTP … For example if I want to smuggle the following request my prefix variable is set to:
'''POST /search
LABS: Reflected XSS into HTML context with all tags blocked except custom ones
No parameter 'search
xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: ru-RU,ru;q=0.8,en-US … ;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length … Python script (almost unchanged from examples/basic.py):
def queueRequests(target, wordlists):
engine
Cookie: session=**************; csrfKey=*************************
Content-Type: application/x-www-form-urlencoded … session=*******************; csrfKey=<<"obtained CSRF cookie HERE">>
Content-Type: application/x-www-form-urlencoded … Went back to the original browser, performed a search from the wiener's page and sent the resulting request … search=hat HTTP/2
Host: LAB_ID.web-security-academy.net
Cookie: session=****************; csrfKey … search=green%0d%0aSet-Cookie:%20csrfKey=YOUR-CSRF_COOKIE HTTP/2
Host: LAB_ID.web-security-academy.net
Hi
There isn't really a way to do this from the Content Discovery engine. … However, if you go to "Settings > Search > Out-of-scope request handling", you can tell Burp to drop
Hello,
I can not download and install Scan Engine Update 2024.1.1.6.
I would like to have a single search window and a possibility to perform multiple searches (and leave … Preferably with an option in the user options to enable or disable tabbed search.
Recently I had an issue that my project file got corrupted after using poorly optimized RegEx in burp search … engine. … of disabling auto-regex evaluation on startup or possibly a way to add RegEx timeout that would stop search
Another great example where Burp is an information engine, more than a solution engine. … Paying for a pro product should supply an easy test path for us to correctly navigate thousands of vulnerabilities … It would be great for Burp to give us a "generic" test solution, so we can go on the fly and stop searching
Try using the "Search" tab to search for UTF encoding.
java 16.0.2 2021-07-20
Java(TM) SE Runtime Environment (build 16.0.2+7-67)
Java HotSpot(TM) 64-Bit … Server VM (build 16.0.2+7-67, mixed mode, sharing)
Burpsuite v2021.10.3
Edition Windows 10 Home
Does the present version of burp suite provides any API to control the Intruder engine that means using
I can't find my old post and the search menu only let me go through all results from the beginning of
In Intruder -> Options -> Request Engine there are options that you can configure to fine tune the engine … options first:
https://portswigger.net/burp/documentation/desktop/tools/intruder/options#request-engine … Please let us know if you require any further information.
I'm learning burp suite from portswigger learning paths and i cannot find this feature.
Howver, I'd deeply appreciate a Search feature in "Extender / BApp Store" (and possibly in the Web version
Searching for a particular string with "Target, Repeater, Proxy, and Organizer" all checked under "Tools". It is not returning the requests that contain that string which have a Source of "Proxy." However, if I uncheck...
POST / HTTP/1.1
Host: xxx-your-lab-id-xxx.web-security-academy.net
Content-Type: application/x-www-form-urlencoded … It was the Repeater results in the Burp Search for "POST /" that eventually returned the API Key....wierd
home directory as a volume and include your Burp license in the file:
- https://docs.docker.com/engine … /reference/builder/#volume
- https://docs.docker.com/engine/tutorials/dockervolumes/
The process … Please let us know if you need any further assistance.
Firefox 67 changes every URL from http: to https: and nothing works.
turbo intruder script
def queueRequests(target, wordlists):
engine = RequestEngine(endpoint=target.endpoint … requestsPerConnection=100,
pipeline=False,
engine
I'd like to have a way to have Burp Search extract all the values that match a certain regex or results … a regex, saving the items without Base64 encoding, opening the file in Sublime, and using its regex search
Would it be possible to add a grep value extractor, similar to what we have in intruder, to the overall search … I may search for all requests with a certain value, but want to be able to see that, or another value … in columns of the search window.
Hi Konstantinos,
Thanks for letting us know about this. … We're working on a few bug fixes in the Task Execution Engine, which manages scans. … Please let us know if you need any further assistance.
Hello,
It would be very useful if there is a tickbox in Burp->Search.
hey, there is no Request Engine here.
Firstly, are you able to provide us with your Burp diagnostic information (Help -> Diagnostics from the … You could also try to configure the settings within Intruder -> Options -> Request Engine. … you can alter:
https://portswigger.net/burp/documentation/desktop/tools/intruder/options#request-engine
Hi guys!
I was thinking that it might be useful to be able to filter searches for HTTP verbs (e.g., only POST, only GET, etc.).
Thanks!
It would be really helpful to be able to specify proxy history searches to be limited to either requests or responses.
nested insertion points for the scanner which is great but it could be very handy to be able to make search … through nested values (ex: to search a string which is encoded in base64).
We do have a work plan for a more advanced execution engine, which will feature what you mentioned and … Please let us know if you need any further assistance.
/my_profile;jsessionid=560423289919l0e2g6f88f71qjg4xp1z2uwc408389.5604232899 HTTP/1.1
Host: www..... … Connection: close
Content-Length: 3002
X-Single-Page-Navigation: true
Origin: https://www..... … Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Accept-Encoding: gzip, deflate
Accept-Language: en-US