Forked from rosehgal/BurpTurboIntruderBasicFileWriteMultiParam.py
Created
May 10, 2021 04:26
-
-
Save tamjid0x01/c3f8f4801b77f53800c3544644811736 to your computer and use it in GitHub Desktop.
Burp Suite Turbo Intruder Example
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
################### This section will mostly remain as it is ################### | |
def queueRequests(target, wordlists): | |
engine = RequestEngine(endpoint=target.endpoint, | |
concurrentConnections=5, | |
requestsPerConnection=100, | |
pipeline=False | |
) | |
################### ---------------------------------------- ################### | |
# This attack will be similar to ClusterBomb technique | |
# As they are nested loops | |
# You can do almost anything here, with the power of python, | |
# this will be applied to request params where you have set %s %s in the Request section in the top | |
for firstParam in open('/usr/share/dict/words'): | |
for secondParam in open('/usr/share/dict/web2'): | |
engine.queue(target.req, | |
[ | |
firstParam.rstrip(), | |
secondParam.rstrip() | |
]) | |
# Do anything with response, let write it to a file. | |
def handleResponse(req, interesting): | |
# currently available attributes are req.status, req.wordcount, req.length and req.response | |
# add response to the table | |
table.add(req) | |
data = req.response.encode('utf8') | |
# Extract header and body | |
header, _, body = data.partition('\r\n\r\n') | |
# Save body to file /tmp/turbo.dat | |
output_file = open("/tmp/turbo.dat","a+") | |
output_file.write(body + "\n") | |
output_file.close() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment