Burp Suite For Pentester Active Scan 1731928346
Burp Suite For Pentester Active Scan 1731928346
Introduction .......................................................................................................... 3
Exploring & Initializing Active Scan++ ................................................................... 3
Enhancing the Audit Functionalities ..................................................................... 6
Audit the application ......................................................................................... 7
Auditing specific Injection Points ....................................................................... 9
Page 2 of 13
Introduction
Using Burp Suite as an automated scanner? Wondering right, even some pentesters do not prefer it, due
to the fewer issues or the vulnerabilities it carries within. But what, if the burp scanner itself could identify
the least common vulnerabilities along with core findings.
one of the most popular burp plugins “Active Scan++” thereby merges up with the burp’s scanner engine
in order to enhance its scanning capabilities to identify the additional issues within an application.
Let’s now switch to the left panel in order to identify the Install button. But wait!! It requires Jython, so
let’s install and configure that first.
Page 3 of 13
Head to Jython’s official website, download the Standalone Jython’s file.
As soon as the file got stored up over at the local machine, we’ll embed it with our Burp Suite application.
Back at the extender tab, navigate to the Options section there and scroll down for the “Python
Environment”, hit the select file button, and then opt for the downloaded file.
Page 4 of 13
Once done with all this, you’ll have your screen somewhat similar to the below image. But, the Jython’s
configuration is yet not over, restart your burp in order to get the changes reflected.
Now head back to the bApp store and open the Active Scan++ righ-side portal. From the below image you
can see that the Install button is now active, let’s fire it to initiate the installation.
Page 5 of 13
Great!! We got the Reinstall button, seems like the extension had been set up successfully.
Page 6 of 13
Audit the application
Turn On the Browser’s Proxy Service and then surf the OWASP’s Mutillidae vulnerable application.
Now, let’s navigate to the Target option over at our burp suite monitor, further head to the Site map.
The Left panel carries up the web application’s hierarchy, let’s opt for the root branch, and then we’ll hit
a right-click to opt “Actively scan this branch” in order to share the application for the scanning part.
Page 7 of 13
And within a few minutes, you can see a number of issues segregated at the right panel, let’s check
them out.
You might find most of the issues discovered with the burp’s scanner but there are some like cache
poisoning, DNS rebinding, Host header Injection, all these additional ones are identified with the Active
Scan++.
Page 8 of 13
Auditing specific Injection Points
What if, you don’t want to test the entire application’s branch or a specific web page, but you want an
injection point to be audited and if it’s possible then does Active Scan++ still collaborate with the burp
scanner?
As soon as we hit the install button at the bApp store, the very first-second Active Scan++ got bound
with the Burp’s Scanner. So, whether it’s about auditing the entire application or a specific injection
point, the Active Scan++ is always involved within it.
And about the Injection point auditing, so let’s do that.
Initiate the bWAPP application with bee: bug and then navigate to the HTML Injection
(Reflected) webpage. Further, we’ll enter some test credentials and hit the Go button with our Proxy
Service turned “ON”
Page 9 of 13
Over at our burp suite monitor, we got the ongoing HTTP request captured, let’s share it with the
intruder.
Once done, let’s navigate to the Position section over at the intruder tab in order to set the injection
point. Simply clear the default selections and add the one you want the scanner to audit.
Page 10 of 13
What now? A simple right-click is always our helping hand. So, let’s hit the mouse right button and then
opt “Scan defined insertion points”.
As we haven’t deleted our previous task, thereby the burp drops two option either to send this request
with the ongoing Audit or to start a new one for this.
Let’s hit the Open Scan launcher in order to start and customize the new scan.
As soon as we do so, we got a window that popped up in front of us stating “New Scan”. Let’s move
forward with the default configuration by hitting the OK button.
Page 11 of 13
From the below image we can see that our scanner captured about 3 Basic and 1 Critical issue by sharing
about 250+ requests at the application’s injection point.
Time to analyze. From the below image, we can see that the burp scanner tested Cross-Site Scripting for
our injection point and dumped the issue details with the exploiting payload and the mitigation steps.
Page 12 of 13
Page 13 of 13
JOIN OUR
TRAINING PROGRAMS
H ERE
CLICK BEGINNER
Network Pentest
Wireless Pentest
ADVANCED
Advanced CTF
Android Pentest Metasploit
EXPERT
Privilege Escalation
APT’s - MITRE Attack Tactics
Windows
Active Directory Attack
Linux
MSSQL Security Assessment
www.ignitetechnologies.in