+++++ Dear ….. Thank you for visiting our booth at the Myanmar Black Hacking. We hope you will have a good time and enjoyed your visit to Underground. In case we won't answer some of your questions about our Real Info, we encourage you to visit our website at www.myanmarblackhacking.com +++++ It will give you a good idea of what we can do for +++++

May 15, 2015

0 Burp Suite ဆုိတာ ?




Burp Suite ဆုိတာ … အလုပ္လုပ္ပုံမတူညီတဲ့ tools ေတြကို Framework တစ္ခုေပၚမွာတစ္စုတစ္စည္းထဲအသုံးျပဳႏုိင္ဖုိ.လုပ္ထားတ ာပါ… သူ.မွာပါတဲ့ tools ေတြက တစ္ျခား framework ေတြနဲ.တူတာေတြလညး္ပါမယ္…ပုံစံမတူတာေတြလည္းပါမယ္ …
Suite ဆုိတာေတာ့အစုံလုိက္လုိ. ဘာသာျပန္ရမယ္ထင္တယ္…
အခု sectools ကေန စာရင္းထုတ္ျပန္ခ်က္အရ… BurpSuite ဟာ…
Tools 20 မွာ နံပါတ္တစ္… Web Scanners Security tools 125 မ်ိဳးမွာ… နံပါတ္ ၁၃ ခ်ိတ္သတဲ့ဗ်ာ…
 သူက… point & click Automatic tool တစ္မ်ိဳးေတာ့မဟုတ္ဘူးေပါ့ဗ်ာ… နည္းနည္းေလးအားစုိက္လုိက္ရင္ သူ.ကုိအရသာေတြ.လာမွာပါ (tool ကုိေျပာတာေနာ္)
ကုိဒုတ္ရဲ. ေက်းွဇူးရယ္… မူရင္း author ရဲ.ေစတနာရယ္ေၾကာင့္ အခုဆုိ v 1.4 ကုိဆရာၾကီးမ်ား version(Pro Ver) သုံးစြဲႏုိင္ပါျပီ…
Burp ကို Java နဲ.ေရးထားတာေၾကာင့္ JRE ကုိေဒါင္းထားဖုိ.လုိပါမယ္…


j ver 1.6.0_21 ကုိေဒါင္းပါ… ဆရာသမားက latest ver နဲ. မေရးထားဘူး…. :mad:
ဒါဆုိေစာေစာက ေဒါင္းထားတဲ့ jar file ကုိrun လုိက္ပါ…
Run မရဘူးဆုိရင္… ဒီမွာဖတ္ျပီးၾကည့္က်က္ လုပ္လုိက္ပါ…


http://portswigger.net/burp/help/suite_troubleshooting.html
 
ဘာေၾကာင့္ Burp ကုိေရြးသင့္လဲ… Webapplication Hacker’s handbook ထဲမွာ… Suite သုံးမ်ိဳးျဖစ္တဲ့
-Burp
-Paros
-Webscarab
သုံးခုရဲ. Features ေတြကုိ comparison လုပ္ျပထားပါတယ္… အေသးစိတ္ကုိ pg663 မွာဖတ္ၾကည့္ပါ…
အားသာခ်က္အားနည္းခ်က္ အားလုံးကုိျခဳံၾကည့္လုိ္က္ရင္… Burp ကအသင့္ေတာ္ဆုံး suite တစ္ခုျဖစ္မွာပါ…
 ဟုတ္ျပီ…ဒါဆုိ Burp ကုိစ run လုိက္တာနဲ. အခုလုိျမင္ရျပီေပါ့…




 

အဲဒီ့မွာ… tab ေတြအမ်ားၾကီးေတြ.ရမွာပါ… tab တစ္ခုခ်င္းစီကမတူညီတဲ့ func ေတြနဲ. အားလုံးအတူတကြလုပ္ေဆာင္ၾကပါတယ္…

Def: (take from postswigger)
• Spider - This can be used for automatically crawling an application, to discover its content and functionality.
• Scanner - This is used to automatically scan HTTP requests to find security vulnerabilities.
• Intruder - This allows you to perform customized automated attacks, to carry out all kinds of testing tasks.
• Repeater - This is used to manually modify and reissue individual HTTP requests over and over.
• Sequencer - This is used to analyze the quality of randomness in an application's session tokens.
• Decoder - This lets you transform bits of application data using common encoding and decoding schemes.
• Comparer - This is used to perform a visual comparison of bits of application data to find interesting differences.


ဒါက tool တစ္ခုခ်င္းစီရဲ. လုပ္ေဆာင္ပုံေတြပါ… ဒီပုိ.စ္မွာ က်ေနာ္က … Burp Proxy ကေနစျပီးေျပာသြားပါမယ္…


Proxy - This is an intercepting web proxy that operates as a man-in-the-middle between the end browser and the target web application. It lets you intercept, inspect and modify the raw traffic passing in both directions.
အရင္ဆုံး ကုိယ့္ browser (firefox) မွာ …
Code:
Tools>>options>>Network>>Settings>>



 

မွာ burp proxy ကုိသုံပါမယ္… ေအာက္မွာၾကည့္လုိက္ပါ…
Localhost ကုိသုံးပါမယ္… ျပီးရင္… Burp >> Proxy tab ကုိဖြင့္လုိက္ပါ… အခုလုိေပ့ါ…




 

Default setting က port 8080 ကုိသုံးထားပါတယ္… တကယ္လုိ. ကုိယ့္မွာ Apache ေတြဘာေတြ run ေနရင္ေတာ့ တျခား… port ေျပာင္းသုံးေပါ့ဗ်ာ…
 တျခား browser ေတြမွာဆုိရင္…
• Internet Explorer - Go to the Tools menu, select Internet Options, go to the Connections tab, and click on the "LAN settings" button. Make sure the "Automatically detect settings" box is unchecked. Make sure the "Use automatic configuration script" box is unchecked. Make sure the "Use a proxy server for your LAN" box is checked. Enter your Burp Proxy listener address in the "Address" field (by default, 127.0.0.1). Enter your Burp Proxy listener port in the "Port" field (by default, 8080). Make sure the "Bypass proxy server for local addresses" box is unchecked. Then click on the "Advanced" button. Make sure the "Use the same proxy server for all protocols" box is checked. Delete anything that appears in the "Exceptions" field. Then click "OK" to close all of the options dialogs.
• Chrome - The Chrome browser picks up the HTTP proxy settings configured on the host computer. If you are using Chrome, you can open your computer's built-in browser and follow the instructions for configuring that. If you aren't sure where the built-in proxy settings are, open Chrome, go to the Customize menu, select Settings, click on "Show advanced settings", and click the "Change proxy settings ..." button. This will open the relevant configuration options for your host computer.
Safari - Go the Safari menu, click on Preferences, click on Advanced, and by the Proxies label click the "Change Settings" button. This will open the Network configuration settings for your current network adapter. In the Proxies tab, check the "Web Proxy (HTTP)" box, and enter your Burp Proxy listener address in the "Web Proxy Server" field (by default, 127.0.0.1), and your Burp Proxy listener port in the (unlabeled) port field (by default, 8080). Ensure the "Bypass proxy settings for these Hosts & Domains" box is empty. Repeat these steps for the "Secure Web Proxy (HTTPS)" checkbox. Click "OK" and "Apply" and close the open dialogs.
အခုဆုိ… ကုိယ့္ browser မွာၾကည့္သမွ်အားလုံးဟာ… burp proxy ကုိျဖတ္ၾကမွာပါ…
အခု… proxy tab ရဲ. ပထမဆုံး intercept ဆုိတဲ့ sub-tab ကုိဖြင့္လုိက္ပါ…သူက … browser ကေနျဖတ္မယ့္… packet ေတြကုိ ဆက္သြားခုိင္းမွာလား…မသြားခုိင္းဘူးလား… ေႏွာက္ယွက္မယ့္လူဆုိးေလးပါ…. ေလာေလာဆယ္ Intercept button ကို off ထားပါ…
တကယ္လုိ. On ထားရင္… browser ကခ်က္ျခင္းမတက္ဘဲ Burp ကေန forward လုပ္ေပးမွ တက္မွာပါ… drop ဆုိရင္ေတာ့ တက္ဘူးေပါ့ဗ်ာ…
Sidenote:Webapplication hacker’s handbook ကုိေသခ်ာဖတ္ဖုိ.လုိမယ္ဗ်… burp suite လုပ္တဲ့ ကုိယ္ေတာ္က … အဲစာအုပ္ေရးတဲ့ လူႏွစ္ေယာက္ထဲကတစ္ေယာက္ေလ… (ဒါေၾကာင့္ကုိယ့္ငါးခ်ဥ္ကုိယ္ခ်ဥ္တာထင္တယ္…ခိခိ)

ကုိယ္က Burp ကုိႏွစ္မ်ိဳးသုံးႏို္င္တယ္…
၁.maual+automatic (semiauto) အေနနဲ.သုံးမွာလား…
၂.point & click scanner အေနနဲ.သုံးမွာလား….
ႏွစ္ခုလုံးသိထားျပီး…. လုိအပ္သလုိသုံးၾကတာေပါ့ဗ်ာ…
ေအာက္မွာ ၾကိဳတင္ျပီးေဒါင္းထားၾကပါတယ္…

To download:


Futher Reading:

0 comments:

Post a Comment