<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>burp &#8211; Secure Batatas</title>
	<atom:link href="/tag/burp/feed/?simply_static_page=453" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Batatas is my foobar. Security.</description>
	<lastBuildDate>Wed, 02 Sep 2015 21:02:01 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=</generator>
	<item>
		<title>Testing uploads with Burp Intruder &#8211; Updated</title>
		<link>/testing-uploads-with-burp-intruder-updated/</link>
					<comments>/testing-uploads-with-burp-intruder-updated/#respond</comments>
		
		<dc:creator><![CDATA[tmendo]]></dc:creator>
		<pubDate>Tue, 01 Sep 2015 10:28:27 +0000</pubDate>
				<category><![CDATA[burp]]></category>
		<category><![CDATA[extension]]></category>
		<category><![CDATA[web security]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[payload]]></category>
		<category><![CDATA[upload]]></category>
		<guid isPermaLink="false">/?p=268</guid>

					<description><![CDATA[Just updated my Intruder extension (described here) to provide two payload generators: the original one with the file contents and another one with the matching file name. So, if you need both the content and file name in your Intruder attack, choose Pitchfork as the Attack type and use File as Payload for one Payload [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Just updated my Intruder extension (described <a href="/?p=250">here</a>) to provide two payload generators: the original one with the file contents and another one with the matching file name.</p>
<p>So, if you need both the content and file name in your Intruder attack, choose Pitchfork as the Attack type and use File as Payload for one Payload set and Filename as Payload for the other.</p>
<p>With this update you can synchronize the file name and its contents in the attack without much hassle, something that was not trivial in the previous version. </p>
]]></content:encoded>
					
					<wfw:commentRss>/testing-uploads-with-burp-intruder-updated/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Testing uploads with Burp Intruder</title>
		<link>/testing-uploads-with-burp-intruder/</link>
					<comments>/testing-uploads-with-burp-intruder/#respond</comments>
		
		<dc:creator><![CDATA[tmendo]]></dc:creator>
		<pubDate>Sat, 22 Aug 2015 01:29:56 +0000</pubDate>
				<category><![CDATA[burp]]></category>
		<category><![CDATA[extension]]></category>
		<category><![CDATA[web security]]></category>
		<category><![CDATA[bapp store]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[intruder]]></category>
		<category><![CDATA[payload]]></category>
		<category><![CDATA[upload]]></category>
		<guid isPermaLink="false">/?p=250</guid>

					<description><![CDATA[While testing an file upload functionality with Burp&#8217;s Repeater I noticed the site response changed depending on the file being uploaded, which is normal if the server is validating the file headers. After a few requests with different responses I got tired of doing this manually and decided to use Burp&#8217;s Intruder feature. I quickly [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>While testing an file upload functionality with Burp&#8217;s Repeater I noticed the site response changed depending on the file being uploaded, which is normal if the server is validating the file headers.<br />
After a few requests with different responses I got tired of doing this manually and decided to use Burp&#8217;s Intruder feature. I quickly noticed that there is no way of telling the Intruder to inject the contents of a list of files in the request.</p>
<p>So I wrote an extension that reads a folder files and feeds their content, one at a time, as a payload to use in the Intruder.<br />
Suppose you have a folder with your best malicious files, zip and xml bombs, jpegs with other contents, php shells, etc. You point the extension to this folder and just use the Repeater normally, setting the payload source as being this extension.<br />
If you need/want to synchronize the file contents with the file name, the extension tab shows the names of the files it just read so you can use them as payload for a second position in the request, using the pitchfork attack.  </p>
<blockquote><p><code><strong>EDIT</strong></code><br />
There is a new version of the extension that provides two generators, one for the file name and other for the file contents, easing this synchronization process. See <a href="/?p=268">this</a> update post.
</p></blockquote>
<div id="attachment_258" style="width: 1065px" class="wp-caption alignnone"><a href="/wp-content/uploads/2015/08/BurpIntruderFilePayload.png"><img aria-describedby="caption-attachment-258" decoding="async" src="/wp-content/uploads/2015/08/BurpIntruderFilePayload.png" alt="Burp Intruder File Payload Extension tab" width="1055" height="449" class="size-full wp-image-258" /></a><p id="caption-attachment-258" class="wp-caption-text">Choosing the input files</p></div>
<div id="attachment_262" style="width: 562px" class="wp-caption alignnone"><a href="/wp-content/uploads/2015/08/BurpIntruderFilePayload2.png"><img aria-describedby="caption-attachment-262" decoding="async" loading="lazy" src="/wp-content/uploads/2015/08/BurpIntruderFilePayload2.png" alt="Configuring the Intruder" width="552" height="339" class="size-full wp-image-262" /></a><p id="caption-attachment-262" class="wp-caption-text">Configuring the Intruder</p></div>
<p>The extension is available <a href="https://github.com/tmendo/BurpIntruderFilePayloadGenerator/raw/master/dist/IntruderFilePayloadGenerator.jar">here</a> as a single jar. The code is available <a href="https://github.com/tmendo/BurpIntruderFilePayloadGenerator" target="_blank">here</a>.<br />
I have submitted it to the BApp Store but it hasn&#8217;t been approved yet.</p>
<blockquote><p><code><strong>EDIT</strong></code><br />
Now available at the BApp Store, <a href="https://portswigger.net/bappstore/ShowBappDetails.aspx?uuid=880cf2cf689b4067afd9db8e2aefb8ba" target="_blank">here</a> :)
</p></blockquote>
<p>Enjoy.</p>
]]></content:encoded>
					
					<wfw:commentRss>/testing-uploads-with-burp-intruder/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>B-Sides Lisbon is coming</title>
		<link>/b-sides-lisbon-is-coming/</link>
					<comments>/b-sides-lisbon-is-coming/#respond</comments>
		
		<dc:creator><![CDATA[tmendo]]></dc:creator>
		<pubDate>Thu, 29 Jan 2015 22:23:03 +0000</pubDate>
				<category><![CDATA[conference]]></category>
		<category><![CDATA[b-sides]]></category>
		<category><![CDATA[burp]]></category>
		<category><![CDATA[lisbon]]></category>
		<guid isPermaLink="false">/?p=83</guid>

					<description><![CDATA[The second edition of B-Sides Lisbon is coming! This security conference is happening at the 3rd of July in Lisbon and its a whole day event with two tracks of talks and some good discussions. And it is free! The previous, and first edition, happened in 2013 and it was awesome. You can revisit the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The second edition of B-Sides Lisbon is coming! This security conference is happening at the 3rd of July in Lisbon and its a whole day event with two tracks of talks and some good discussions. And it is free!</p>
<p><a href="/wp-content/uploads/2015/01/Screen-Shot-2015-01-29-at-21.39.40.png"><img decoding="async" loading="lazy" src="/wp-content/uploads/2015/01/Screen-Shot-2015-01-29-at-21.39.40.png" alt="Screen Shot 2015-01-29 at 21.39.40" width="286" height="239" class="alignnone size-full wp-image-87" /></a></p>
<p>The previous, and first edition, happened in 2013 and it was awesome. You can revisit the program <a href="https://web.archive.org/web/20131007130544/http://www.bsideslisbon.org/?page_id=86" title="B-Sides Lisbon 2013 schedule archive" target="_blank">here</a> and search for the talks on Google (you will find some for sure).<br />
With a quick search I found Bruno Morisson&#8217;s preso:</p>
<p><iframe loading="lazy" src="//www.slideshare.net/slideshow/embed_code/24105478" width="425" height="355" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; max-width: 100%;" allowfullscreen> </iframe><br />
btw, he is also one of the organizers :)</p>
<p>I also did a presentation on how to start using Burp Suite, including a few tips to use it more efficiently:</p>
<p><iframe loading="lazy" src="//www.slideshare.net/slideshow/embed_code/26915928" width="425" height="355" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" style="border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;" allowfullscreen> </iframe></p>
<p>Now that you know this years edition will be even better, go ahead and submit a talk <a href="http://www.bsideslisbon.org/call-for-papers/" title="B-Sides Lisbon 2015 call for papers" target="_blank">here</a></p>
]]></content:encoded>
					
					<wfw:commentRss>/b-sides-lisbon-is-coming/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
