基本
- 在burpsuite的proxy的opions中禁用掉
web interface [http://burpsuite](http://burpsuite/)
防止被检测到使用burpsuite在抓包 - 禁止发送usage信息
将 401响应码改为200,或者修改为成功的响应数据包内容,可以用来挖未授权访问的洞,Proxy->Options->Match and Replace->Add
正则匹配筛选页面结果
爆破的时候用来筛选关键词 Intruder->Options->Grep-Extract->Add
检测CORS
Proxy->Options->Match and Replace,
Request header 将空(/)替换we Origin:foo.example.org,burp 会加个 Origin 的请求头
1 | Response header => Access-Control-Allow-Headers:* |
漏洞的挖掘原理方面,这篇博客讲的很详细 CORS原理及利用整理
过滤无用OPTIONS请求
https://captmeelo.com/pentest/2020/01/06/filter-options-method.html
https://parsiya.net/blog/2019-10-13-quality-of-life-tips-and-tricks-burp-suite/
其他配置
https://parsiya.net/blog/2019-10-13-quality-of-life-tips-and-tricks-burp-suite/
https://github.com/parsiya/Parsia-Clone/blob/main/configs/burp-default-config.json
https://www.ryanwendel.com/2019/04/23/burp-suite-tips-volume-1/
https://blog.isiraadithya.com/intigriti-tip-using-burp-match-and-replaces-rules/
https://gowthams.gitbook.io/bughunter-handbook/burp-suite-tips-and-tricks
- Post title:BurpSuite Match and Replace Tips
- Post author:ssooking
- Create time:2021-11-26 16:26:00
- Post link:https://ssooking.github.io/2021/11/burpsuite-match-and-replace-tips/
- Copyright Notice:All articles in this blog are licensed under BY-NC-SA unless stating additionally.