Links I found interesting today. Click the title above to see more details.
Things I found interesting today - A Glossary of Blind SSRF Chains
Things I found interesting today - Why Interface, and when.
Things I found interesting today - Theseus OS A Proposal for Adding Generics to Go Go: Understand the Empty Interface Metaprogram in Go Sigurls - A Reconnaissance Tool, It Fetches URLs From AlienVault’s OTX, Common Crawl, URLScan, Github And The Wayback Machine Building a Custom Malware Analysis Lab Environment AWS Security Maturity Roadmap 2021 🔥 ssrf-king 🔥 Go Slice Tricks Cheat Sheet A Better Way To Use Twitter
Writing a Burp Extension in Ruby Burp extensions can be written in 3 languages - Java, Python, and Ruby. Since Burp is a java app, in order to write extensions in Python you need Jython and in Ruby you need JRuby. For this example, we’ll use Ruby. Step 1 - Downloading JRuby The first step is to download JRuby from https://jruby.org/download. For this example we will be using the latest - 9.
Introducing my latest Burp extension - “Passive Search”. Passive Search searches for a list of terms in HTTP responses and creates an issue if it finds one. I got the idea of after maintaining a list of things that I was checking for in responses and using either the search in HTTP History on an item by item basis or using the global Search. It was a completely manual process.
Today I started a new project that I’ve been thinking about for awhile. It’s located at – https://appsec.fyi. It is a growing collection of interesting links that I’ve found regarding varying application security topics. The basic site is up and the plumbing is there. Just need to add more content. Check it out!
Python List Comprehensions is a pretty interesting feature that I haven’t seen in other languages (at least that I’ve played with). The basic idea is that they create lists from other iterables. They consists of brackets containing the expression which is executed against each item in the iterable object. One or more conditionals dictate if the item is added to the new list. The basic format is – list = [expression for_loop_one_or_more conditions]
Excited to see AuthHeader Updater on a list of awesome burp extensions !
Excited to release Auth Header Updater today – a Burp extension to update Authorization headers during a scan and also guest post about it on ihackthings.online . Read more about it at ihackthings.online or chs.us . Source code and plugin available on GitHub . ~
Just whipped together a new Burp extension called perfmon (not to be confused with the Windows tool of the same name). I was really interested in the the resource usage of Burp while doing certain activities. It adds a new tab to Burp and samples every 5 seconds- Current and max number of threads in use Current and max memory used Current and max memory allocated
This is the first part in a series that I plan to write on how to create Burp extensions. I became interested in writing Burp extensions at a previous company where we were fortunate enough to be given time to do research presentations and then present them to our peers. My first presentation topic was to write an Active Scanning extension in Burp that would look for XXE (XML External Entity Injection).
BinPeek is an application that checks to see if a Windows application is managed(.NET) or unmanaged(native). It handles x86 and x84 executables. If doing it manually, you must check several values in the PE (Portable Executable) file header that differ slightly based on whether the executable is 32-bit or 64-bit. BinPeek does that work for you. Usage Project Page on Github <img src="https://chs.us/images/binpeek-300x197.png" alt="BinPeek"> Install Build with Visual Studio or just use the release version in the repo.