The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

About OS command injection inspection

Takahiro | Last updated: Aug 01, 2024 03:29PM UTC

I was curious about what kind of payload Burp uses to send to the Collaborator server when scanning for blind OS command injection. So I looked at the logs from the scan. I saw that only the nslookup command was used. I thought that this would mean that the Collaborator server set up in a local environment would not be able to detect blind OS command injection because it does not have a domain name, only an IP address. In fact, when I tried to detect blind OS command injection with the Collaborator server set up in a local environment, it was not possible. The only payload sent was "<IP>/h3l9s70apuoak6w92hhj987br2xvlm9ex5nsdg2". It's no surprise that OS command injection cannot be detected with only the above payload. Burp misses even fairly simple blind OS command injection. Is this by design? I would like accurate information about this so that I can use Burp in my work.

Michelle, PortSwigger Agent | Last updated: Aug 02, 2024 12:00PM UTC