当前位置:网站首页>Pinpoint attackers with burp
Pinpoint attackers with burp
2022-06-26 23:26:00 【st3pby】
Technical communication
Pay attention to WeChat public number Z20 Security team , reply Add group , Pull you into the group Discuss technology together .

The official account is copied. , The layout may be a bit messy , You can go to the official account .

burp yes web Penetrating , The most commonly used tool , If we can find out who used it on our website burp Test by agent , Nine times out of ten that person would be an attacker .
principle
Used to burp Of all know , If the default installation configuration , Hang up burp, visit
http://burpThe following page will appear :

except `http://burp` outside , also :
http://127.0.0.1:8080/ #8080 The port is not fixed , yes burp The proxy port ofhttp://burpsuite/
The above interface will also appear .
Pay attention to the picture above , There's... In the upper left corner burp The icon , Like most other websites , visit
http://xxxx/favicon.icoYou will get the icon of the website :

We can use this to judge the users who visit our website , Have you used burp agent , To determine if it was the attacker .
Basics
Simply write a test page :
index.html
<html><head><title>burp test</title><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /></head><body><img src="http://burp/favicon.ico" onload="alert('Burp is being used')" ></body></html>
then , Turn on burp The proxy user accesses this page , It will trigger :

Into the rank
What can we do with this point :
take burp Detect that the code inserted into the website is normal js In file , Usage detected burp after , Log attackers ip, Then ban ip, In this way, the attacker will be intercepted when he visits again ;
The detection code is placed in the sensitive location of the normal website , For example, the login page , Usage detected burp after , Log attackers ip, Then guide the attacker into the honeypot or guide the attacker to download exe;
......
......
Here's a demo Here's a simple demonstration of :
【 There is no way to play the video , It is recommended that the public view utilize burp Pinpoint the attacker 】
Then the attacker ip It was recorded that attacker.txt file :

Of course , You still have many ways to improve it , Here is just a demonstration of the effect ...
protective
So how to prevent being discovered ?
The simplest way is to set up the proxy , Do not use proxy for the following three host names :

The other way is in burp options in , Tick the following two options


Technical communication
Communication group
Pay attention to the reply of the official account “ Add group ”, add to Z2OBot Small K Automatically pull you to join Z2O Security attack and defense communication group Share more good things .

边栏推荐
- [interface] pyqt5 and swing transformer for face recognition
- UnityEditor编辑器扩展-表格功能
- 电子协会 C语言 1级 29 、 对齐输出
- CVPR2022-不对称分辨率图像的立体匹配
- Restfultoolkitx of idea utility plug-in -- restful interface debugging
- Is it safe to open an account on the mobile phone to buy stocks? Is it safe to open an account on the Internet to speculate in stocks
- 微信小程序自动生成打卡海报
- Implement the queue through two stacks
- Leetcode 718. Longest repeating subarray (violence enumeration, to be solved)
- ASP. Net core create MVC project upload file (buffer mode)
猜你喜欢
![[cloud native topic -51]:kubesphere cloud Governance - operation - step by step deployment of microservice based business applications - database middleware redis microservice deployment process](/img/42/c2a25bb7a9fdad8fe0a048e9af44ca.jpg)
[cloud native topic -51]:kubesphere cloud Governance - operation - step by step deployment of microservice based business applications - database middleware redis microservice deployment process

PHP代码审计系列(一) 基础:方法、思路、流程

12色彩环三原色
![[interface] pyqt5 and swing transformer for face recognition](/img/37/b259627a8ffd82afe8e8f3029bf290.png)
[interface] pyqt5 and swing transformer for face recognition

A simple and crude method for exporting R language list to local

入侵痕迹清理

Unity初学者肯定能用得上的50个小技巧
![How to download on selenium computer -selenium download and installation graphic tutorial [ultra detailed]](/img/ec/1c324dcf38d07742a139aac2bab02e.png)
How to download on selenium computer -selenium download and installation graphic tutorial [ultra detailed]

300 questions lesson 3 vector group

代码之外:写作是倒逼成长的最佳方式
随机推荐
[710. random numbers in the blacklist]
【混合编程jni 】第十一篇之JNA详情
【混合编程jni 】第九篇之Jni总结
Extensions de l'éditeur d'unityeditor - fonctions de table
UnityEditor编辑器扩展-表格功能
Operator介紹
Do an online GIF synthesis service at no cost
Leetcode - the best time to buy or sell stocks
Different subsequence problems I
Is it reliable to open an account for stock trading on the mobile phone? Is it safe to open an account for stock trading on the Internet
Tensorrt笔记(七)Tensorrt使用问题整理
【混合编程jni 】第七篇之JNI 的命令行们
阿里云服务器的购买、基本配置、(xshell)远程连接、搭建环境
Electronic Society C language level 1 31. Calculate line segment length
Share three methods of automatic summation in Excel
Restfultoolkitx of idea utility plug-in -- restful interface debugging
Leetcode 718. 最长重复子数组(暴力枚举,待解决)
go中的微服务和容器编排
golang语言的开发学习路线
Solid and ambient colors