Professional
Adds passive checks to the Burp scanner. The following is a list of items it will look for:
It does this by looking at the HTML received and loads the DOM via a headless Chromium instance using Selenium.
A "JavaScript Security" tab will appear in your burp session which allows you to configure two things:
It is possible to load indicators of compromise (IOCs) as JSON files through the GUI tab. Examples are provided in the intel folder.
When you run passive checks, the checks installed will run. Any output or errors will appear on the Extender/Extensions tab under "JavaScript Security -- SRI and Threat Intel".
Author |
Author
Peter Hefley |
---|---|
Version |
Version
1.1 |
Rating |
Rating |
Popularity |
Popularity |
Last updated |
Last updated
10 September 2019 |
Estimated system impact |
Estimated system impact
Overall impact: Empty
Memory
Empty
CPU
Empty
General
Empty
Scanner
Empty
|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|
You can view the source code for all BApp Store extensions on our GitHub page. |
|
Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates. |
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.