推荐一个burp插件

2020/09/13 18:16
阅读数 887


点进来的应该有很多绅士吧😏,都给你



今天给大家介绍一款Burpsuite插件,burpFakeIP


一、下载地址

https://github.com/TheKingOfDuck/burpFakeIP


二、安装插件

1、解压到本地

2、打开burpsuite,选择Extender,Add

3、选择下载好python插件,选择下一步

4、安装成功


三、使用方法

1、伪造指定ip,右击抓到的数据包,选择fakeip,inputIP,输入想要用的ip地址,点击确定,自动添加

2、伪造本地ip,右击数据包选择127.0.0.1,自动生成如下数据包

GET / HTTP/1.1Host: 192.168.1.135:8002User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateCookie: ASPSESSIONIDAACSRSQS=CJLFMKFBLOABHEPKPBEKLPOA; ASPSESSIONIDAACSRTRT=HOAFJLFBABBHLECCHJEGMIMODNT: 1Connection: closeUpgrade-Insecure-Requests: 1X-Forwarded-For:127.0.0.1X-Forwarded:127.0.0.1Forwarded-For:127.0.0.1Forwarded:127.0.0.1X-Forwarded-Host:127.0.0.1X-remote-IP:127.0.0.1X-remote-addr:127.0.0.1True-Client-IP:127.0.0.1X-Client-IP:127.0.0.1Client-IP:127.0.0.1X-Real-IP:127.0.0.1Ali-CDN-Real-IP:127.0.0.1Cdn-Src-Ip:127.0.0.1Cdn-Real-Ip:127.0.0.1CF-Connecting-IP:127.0.0.1X-Cluster-Client-IP:127.0.0.1WL-Proxy-Client-IP:127.0.0.1Proxy-Client-IP:127.0.0.1Fastly-Client-Ip:127.0.0.1True-Client-Ip:127.0.0.1


3、伪造随机IP,右击数据包选择randomIP,生成如下数据包

GET / HTTP/1.1Host: 192.168.1.135:8002User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:52.0) Gecko/20100101 Firefox/52.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateCookie: ASPSESSIONIDAACSRSQS=CJLFMKFBLOABHEPKPBEKLPOA; ASPSESSIONIDAACSRTRT=HOAFJLFBABBHLECCHJEGMIMODNT: 1Connection: closeUpgrade-Insecure-Requests: 1X-Forwarded-For:37.120.247.234X-Forwarded:37.120.247.234Forwarded-For:37.120.247.234Forwarded:37.120.247.234X-Forwarded-Host:37.120.247.234X-remote-IP:37.120.247.234X-remote-addr:37.120.247.234True-Client-IP:37.120.247.234X-Client-IP:37.120.247.234Client-IP:37.120.247.234X-Real-IP:37.120.247.234Ali-CDN-Real-IP:37.120.247.234Cdn-Src-Ip:37.120.247.234Cdn-Real-Ip:37.120.247.234CF-Connecting-IP:37.120.247.234X-Cluster-Client-IP:37.120.247.234WL-Proxy-Client-IP:37.120.247.234Proxy-Client-IP:37.120.247.234Fastly-Client-Ip:37.120.247.234True-Client-Ip:37.120.247.234


4、随机ip爆破,伪造随机ip爆破是本插件最核心的功能。

将数据包发送到Intruder模块,在Positions中切换Attack type为Pitchfork模式,选择好有效的伪造字段,以及需要爆破的字段

将Payload来源设置为Extensin-generated,并设置负载伪fakeIpPayloads,然后设置第二个变量。

点击Start attack开始爆破.




怕什么真理无穷,进一寸有进一寸的欢喜


本文分享自微信公众号 - 一个安全研究员(sec_tntaxin)。
如有侵权,请联系 support@oschina.cn 删除。
本文参与“OSC源创计划”,欢迎正在阅读的你也加入,一起分享。

展开阅读全文
打赏
0
0 收藏
分享
加载中
更多评论
打赏
0 评论
0 收藏
0
分享
返回顶部
顶部