欢迎您访问程序员文章站本站旨在为大家提供分享程序员计算机编程知识!
您现在的位置是: 首页  >  网络运营

Burp Suite工具使用之三-Repeater and Comparer模块介绍

程序员文章站 2022-03-12 15:48:55
Hi everyone, I was very happy to see that a lot of people liked the Burp Suite Tutorial (Intrud...

Hi everyone,

I was very happy to see that a lot of people liked the Burp Suite Tutorial (Intruder Tool) blog post last week. I plan to publish more tutorials for the Burp Suite and this week I will be covering the Repeater and Comparer tools.

What are the Repeater and Comparer tools?

The Burp Suite is made up of multiple tools and today we will be taking a look at the Repeater and Comparer tools (descriptions take from the Port Swigger website):

Repeater: Burp Repeater is a tool for manually modifying and reissuing individual HTTP requests, and analysing their responses. It is best used in conjunction with the other Burp Suite tools. For example, you can send a request to Repeater from the target site map, from the Burp Proxy browsing history, or from the results of a Burp Intruder attack, and manually adjust the request to fine-tune an attack or probe for vulnerabilities.

Comparer: Burp Comparer is a simple tool for performing a comparison (a visual “diff”) between any two items of data. In the context of attacking a web application, this requirement will typically arise when you want to quickly identify the differences between two application responses (for example, between two responses received in the course of a Burp Intruder attack, or between responses to a failed login using valid and invalid usernames), or between two application requests (for example, to identify the different request parameters that give rise to different behaviour).

I explained how to use the Intruder tool in the last blog post and I will show you how to use the Repeater and Comparer tools this week. We will run the same Intruder tests as last week and show you how you can use the Repeater and Comparer tools to perform additional testing based on the intruder test results. The first part of the tutorial is very similar to the Intruder tool because we will use the results from the intruder test to demonstrate the Repeater and Comparer tools.

Enabling the Burp Suite Proxy

To begin using the Burp Suite to test our example web application we need configure our web browser to use the Burp Suite as a proxy. The Burp Suite proxy will use port 8080 by default but you can change this if you want to.

You can see in the image below that I have configured Firefox to use the Burp Suite proxy for all traffic.

Burp Suite工具使用之三-Repeater and Comparer模块介绍

When you open the Burp Suite go to the proxy tool and check that the proxy is running by clicking on the options tab:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

You can see that the proxy is using the default port:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

The proxy is now running and ready to use. You can see that the proxy options tab has quite a few items that we can configure to meet our testing needs. A lot of these items are out side of the scope of this tutorial.

The Burp Suite will now begin logging the requests and responses that pass through the proxy. We have browsed to the logon page of our example application and the Burp Suite proxy has captured the request and response:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

Burp Suite工具使用之三-Repeater and Comparer模块介绍

The logon page is very simple, we have two input points that we need to test for input validation weaknesses.

We need to capture a logon request and replace the username and password values with our test inputs.

To do this we must ensure that the Burp Suite proxy is configured to intercept our requests:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

With the intercept enabled we will submit the logon form and send it to the intruder as you can see below:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

Burp Suite工具使用之三-Repeater and Comparer模块介绍

The Burp Suite will send our request to the intruder tool so we can begin our testing. You can see the request in the intruder tool below:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

The tool has automatically created payload positions for us. The payload positions are defined using the § character, the intruder will replace the value between two § characters with one of our test inputs.

Selecting a payload

So far we have enabled the Burp Suite proxy, captured a request, sent it to the intruder tool and marked our payload positions. We now need to tell the intruder tool what values to insert into the positions.

To define our payloads we need to click on the payloads tab within the intruder tool:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

We are going to use the sniper attack type in this example so we only have one payload set. The dropdown menu next to the payload set number allows you perform many different types of testing/data manipulation.

We are going to use a predefined list of inputs for our testing:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

Configuring intruder options

The options tab in the intruder tool allows you to configure additional test parameters including a grep function, enabling a DOS mode and deciding how you want the Burp Suite to handle 3xx redirects.

For this example we are going to the grep function to perform a simple pattern match. The Burp Suite will provide you with a default list of words to match against but we are going to remove these and add our own for this test.

The logon form that we are going to test uses an XML file containing usernames and passwords to authenticate our users. The username and password values we provide will be entered into an XPATH query. If the application fails to securely validate these values an XPATH Injection vulnerability could exist.

We want the intruder tool perform a pattern match for us using the word “XPATH”. This should allow us to easily identify any XPATH errors caused by our test inputs:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

Executing our tests

The only thing left for us to do now is to execute our tests.

To start the intruder tool you need to click “intruder” on the top menu and then click on “start”:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

A separate window will be opened which will show you each test, the payload used, the status code, length and in our case the tests which match our XPATH pattern match word:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

You can see that some of the tests matched our pattern match word by looking at the tick boxes in the XPATH column.

To review the request and the response for each test you can double click any of the requests shown in the attack window.

We are going to review request 13 which entered a single quote (‘) into the username field:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

This single quote caused an XPATH error to be thrown by the application:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

So as you can see we have used the Burp Suite intruder tool to identify a potential XPATH injection vulnerability.

Fine tuning the attack with the Repeater Tool

The Repeater tool will allow us to manually modify and submit requests and view the response within the Burp Suite. We can use the Repeater tool to manually test any potential vulnerabilities that have been highlighted by the Intruder tool. This approach allows us to submit a large amount of requests (84 in this example) automatically with the Intruder tool and fine tune any “interesting” requests (4 in this example) with the Repeater. The Intruder tool has highlighted 4 responses which include our pattern matching keyword “XPATH”.

We will right click request number 13 (the same request as we looked at above) and send this to the Repeater tool:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

The Burp Suite will send request number 13 to the Repeater tool as shown below:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

We have seen in the Intruder tool that entering a single quote (‘) into the username field gives us an XPATH error. This could potentially be exploited by a malicious user to bypass our authentication check.

In the Repeater tool you modify the request however you want and click on the “go” button. The response will be shown in the bottom pane of the Repeater tool:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

Burp Suite工具使用之三-Repeater and Comparer模块介绍

We want to use the Repeater tool to fine tune our attack against the username field so we can replace the username and password value with different inputs and submit these individual requests.

The error message we received in the response shown above was:

Incorrect username: Invalid XPath expression: //users/user[username=''']/password Expected: ]

You can see that our single quote is breaking the XPATH query. We need to use these error messages to our advantage. If we continue to modify the username value we should eventually be able to exploit this vulnerability thanks to the lack of input validation and the informative error messages.

The informative error messages will help us exploit this flaw because we can see that the XPATH query looks something like this:

//users/user[username=' “username supplied by user” ']/password

It should now be obvious why our single quote broke the query. We can manually modify the username value using the Repeater tool until we find an input that doesn’t break the query and allows us to authenticate without knowing a valid username.

In the image below you can see that we have replaced the single quote with a different input which allows us to move closer to exploiting this flaw:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

When we use the Repeater to submit a request where the username value is ‘ or ’1′ =’1 we get a different error. The error tells us the password (blank in the request) we submitted was incorrect. The XPATH query will now look something like this:

//users/user[username=' ' or '1' ='1 ']/password

This means that the username value we submitted is “OK” and we now need to guess a password value. We can brute force this value using the Intruder tool as we saw in the Intruder tool tutorial. I would like you to assume that I have brute forced this value using the Intruder tool and I have entered it into the Repeater tool below:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

By passing in the ‘ or ’1′ =’1 value as the username and our brute forced password value we have successfully logged into the Payment Page of our application.

Comparing responses with the Comparer tool

The Comparer tool allows us to compare multiple requests and responses to easily see the differences between them. In our Intruder tool test you can see that tests 9, 13 and 23 all matched our pattern matching keyword but the size of the responses were all slightly different.

Burp Suite工具使用之三-Repeater and Comparer模块介绍

We can use the Comparer tool to compare the three responses and show us the differences between them by right clicking them in Intruder attack window and selecting “send response to comparer”:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

In the image below you can see that all three of the responses are now in the Comparer tool:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

You can select two responses and click on one of the two compare types (descriptions take from the Port Swigger website):

Words: This comparison tokenises each item based on whitespace delimiters, and identifies the token-level edits required to transform the first item into the second. It is most useful when the interesting differences between the compared items exist at the “word” level, for example in HTML documents containing different content.

Bytes: This comparison identifies the byte-level edits required to transform the first item into the second. It is most useful when the interesting differences between the compared items exist at the “byte” level, for example in HTTP requests containing subtly different values in a particular parameter or cookie.

We are going to use the words comparer to compare request number 3 against request number 5:

Burp Suite工具使用之三-Repeater and Comparer模块介绍

Burp Suite工具使用之三-Repeater and Comparer模块介绍

You can see that the main difference between the two requests is the XPATH error message that is returned. The response with the smaller length does not have “password expected” in its error message.

I hope you have found this blog post useful and I’m always interested in hearing any feedback you have