The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

Collaborator feature to exfiltrate data

Maurizio | Last updated: Jul 05, 2018 07:56AM UTC

Currently the collaborator it allow only to understand if a specific request generate an interaction with the collaborator on own payload. It would be very useful to add a feature to show in burp also exfiltrated data. For example, a normal collaborator DNS request is: l8unsfv43bbasbil8bo4o4edl4rufj.pippo.pluto.net Having the possibility to add data like will help tester, for example: XXXXXXXXXXXXXXXXXXXXXXl8unsfv43bbasbil8bo4o4edl4rufj.pippo.pluto.net Currently this king of request isn't shown inside burp because the hostname doesn't match with the one that has been generated. Maurizio

Burp User | Last updated: Jul 05, 2018 09:47AM UTC

Ok, my fault... the feature is already implemented, just use the 4th level domain like: XXXXXXXXXXXXXXXXXXXXXX.l8unsfv43bbasbil8bo4o4edl4rufj.pippo.pluto.net Maurizio

PortSwigger Agent | Last updated: Jul 05, 2018 12:08PM UTC