BurpSuite Match and Replace Tips
ssooking Lv5

基本

  1. 在burpsuite的proxy的opions中禁用掉 web interface [http://burpsuite](http://burpsuite/)防止被检测到使用burpsuite在抓包
  2. 禁止发送usage信息

将 401响应码改为200,或者修改为成功的响应数据包内容,可以用来挖未授权访问的洞,Proxy->Options->Match and Replace->Add

正则匹配筛选页面结果

爆破的时候用来筛选关键词 Intruder->Options->Grep-Extract->Add

检测CORS

Proxy->Options->Match and Replace,

Request header 将空(/)替换we Origin:foo.example.org,burp 会加个 Origin 的请求头

1
Response header => Access-Control-Allow-Headers:*

漏洞的挖掘原理方面,这篇博客讲的很详细 CORS原理及利用整理

过滤无用OPTIONS请求

其他配置

https://gowthams.gitbook.io/bughunter-handbook/burp-suite-tips-and-tricks

https://github.com/PortSwigger/match-replace-session-action

  • Post title:BurpSuite Match and Replace Tips
  • Post author:ssooking
  • Create time:2021-11-26 16:26:00
  • Post link:https://ssooking.github.io/2021/11/burpsuite-match-and-replace-tips/
  • Copyright Notice:All articles in this blog are licensed under BY-NC-SA unless stating additionally.