The Burp Suite User Forum was discontinued on the 1st November 2024.

Burp Suite User Forum

For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.

SUPPORT CENTER DISCORD

How to wrap absolutely all requests from scaner in Base64

ZombieJesus | Last updated: Jul 07, 2023 07:54PM UTC

Greetings! I started studying the software not so long ago. And I have a question: how to wrap __absolutely all__ requests that the scanner sends to a target in Base64? I know how to do it in Intruder for one request, but I haven't found how to wrap the payload for all requests from scanner and extensions. I have read the documentation. I have searched the forum. But I didn't find the answer. Is this even possible?

Hannah, PortSwigger Agent | Last updated: Jul 10, 2023 10:47AM UTC

Hi Could you provide some more information on the functionality you are looking for? Are you looking for just the insertion points to be base-64 encoded or the full content of the request? Is this while performing a full scan, or are you trying to scan individual pages/audit items/insertion points?

ZombieJesus | Last updated: Jul 10, 2023 12:05PM UTC

Greetings. Thanks for the reply! So, a clarification: the software sends requests to the target, for example exampe.com/a.php?id=1' but then the server responds with a 403. and if you send it like this exampe.com/a.php?id=MSc= (base64(1') = MSc=) then the status is 200 How to wrap all requests in base64 exampe.com/a.php?id=1' -> exampe.com/a.php?id=MSc= exampe.com/a.php?id=1'' -> exampe.com/a.php?id=MScn exampe.com/a.php?id=1' -- -> exampe.com/a.php?id=MScgLS0= etc.? Not necessarily just SQL-Inj, but any payload. Yes, I have tried processing in Intruder payloads, but it takes a very long time. Usually I work like this, I find a request(s) I'm interested in and process it through Intruder in various ways. But in this case I think it will take me millennia. That's why I asked if there was a simpler option where Burp itself sets tampers for every load it sends to the server.

Hannah, PortSwigger Agent | Last updated: Jul 11, 2023 09:18AM UTC

If you're auditing individual requests or insertion points, then you could try using Hackvertor tags to auto-encode the parameter content. You can find Hackvertor on the BApp Store. You could also write your own extension that provides custom insertion points. The insertion point has the responsibility to perform any data encoding that is necessary, given the nature and location of the insertion point. These custom insertion points would be in addition to any default insertion points, but all the same scan checks would be run through them.

ZombieJesus | Last updated: Jul 12, 2023 02:56PM UTC