Burp Bounty配置及规则文件 profiles+rules

Burp Bounty配置及规则文件 profiles+rules

不了解Burp Bounty的参考如下文章:

昨天发的是Burp Bounty pro,相当于一个扫描器框架,今天发的相当于payloads或者说exp/poc.

Burp Bounty pro只有配合配置文件+规则库才有用.

Burp Bounty规则库列表

├─profiles
│      AccessToken.bb
│      Action_parameters.bb
│      Amazon_AWS_Url.bb
│      Api_path.bb
│      Artica_Web.bb
│      Artica_Web_Proxy_Auth_Bypass_CVE-2020-17506.bb
│      Artica_Web_Request.bb
│      Atlassian_Crowd_RCE_CVE-2019-11580.bb
│      Authorization_Bearer.bb
│      AWS_Access_Key_ID.bb
│      AWS_Region.bb
│      Azure_Blob_Discovered.bb
│      Basic_Auth_Credentials.bb
│      Bitcoin_Address.bb
│      Blind_RCE_Linux.bb
│      Blind_RCE_Windows.bb
│      Blind_XSS_append.bb
│      Blind_XSS_replace.bb
│      Blind_XXE.bb
│      CDN_Detected.bb
│      Cisco_ASA_Device_Found.bb
│      Cisco_ASA_LFI-CVE-2020-3452.bb
│      Cisco_Request_Detected.bb
│      Cisco_Wan_VPN_disclosure-CVE-2019-1653.bb
│      Citrix_ADC_Directory_Traversal_CVE-2019-19781.bb
│      Citrix_Detection.bb
│      Citrix_ShareFile_File_Read_CVE-2020-8982.bb
│      Citrix_XenMobile_PathTraversal.bb
│      CMS_Found.bb
│      CORS Misconfiguration.bb
│      CouchDB_Admin_Exposure.bb
│      CouchDB_Request.bb
│      CouchDB_Response.bb
│      CRLF_append.bb
│      CRLF_replace.bb
│      Debug Pages.bb
│      Debug_Logic_Parameters.bb
│      Debug_variables.bb
│      DigitalOcean_Space_Discovered.bb
│      Docker_API_Response.bb
│      DomainTakeOver_Strings.bb
│      Drupal_Response.bb
│      Drupal_User_Enum.bb
│      Drupal_User_Enum_Redirect.bb
│      easy_wp_smtp_listing_enabled.bb
│      Echo_RCE_append.bb
│      Echo_RCE_replace.bb
│      EndpointsExtractor.bb
│      Expect_RCE.bb
│      F5-BigIP_CVE-2020-5902.bb
│      File_Manager_Wordpress_Backups_CVE-2020-24312.bb
│      Firebase DB detected.bb
│      Fortinet_Panel.bb
│      Fortinet_Request.bb
│      FortiOS_Creds_Disclosure_CVE-2018-13379.bb
│      Fuzzing_directories.bb
│      GCP_Service_Account.bb
│      GCP_Urls.bb
│      GitFinder.bb
│      Gmail_Oauth_2.0.bb
│      Google_Cloud_Buckets.bb
│      GraphQL_Endpoint.bb
│      Hidden Parameters.bb
│      Host_Header_Injection.bb
│      IDOR_parameters.bb
│      Interesting_Keyworks.bb
│      Java_De-Serialization.bb
│      Jenkins_Response.bb
│      Jira_Info_Exposure_CVE-2020-14179.bb
│      Jira_Path_Traversal_CVE-2019-8442.bb
│      Jira_Request.bb
│      Jira_SSRF_CVE-2017-9506.bb
│      Jira_unauthenticated_Info.bb
│      JIRA_Unauthenticated_Sensitive_Info_CVE-2019-8449.bb
│      Jira_User_Enum_CVE-2020-14181.bb
│      Joomla detection.bb
│      JS_Variables.bb
│      Keys.bb
│      Key_Parameters.bb
│      Kubernetes_API_Exposed.bb
│      Kubernetes_Response.bb
│      LFI_RFI_Parameters.bb
│      MAC_Address.bb
│      MAGMI_Request.bb
│      MAGMI_Response.bb
│      MAMGI_Auth_Bypass_CVE-2020-5777.bb
│      Netsweeper_code_injection_CVE-2020-13167.bb
│      Netsweeper_Request.bb
│      Netsweeper_Response.bb
│      NoSQL_Session_Token.bb
│      OAuth_parameters.bb
│      Open Firebase Database.bb
│      OpenRedirect-ParameterPollution.bb
│      OpenRedirect-ParameterPollution_Path.bb
│      OpenRedirect.bb
│      OpenRedirect_SSRF_Collaborator.bb
│      OpenRedirect_SSRF_Collaborator_HTTP0_9.bb
│      OpenRedirect_SSRF_Collaborator_HTTP1_0.bb
│      OpenRedirect_SSRF_Parameters.bb
│      OpenRedirect_to_Account_Takeover.bb
│      Openredirect_to_XSS.bb
│      Oracle_WebLogic_RCE_CVE-2020-2551.bb
│      Outlook_Team.bb
│      PathTraversal_Linux.bb
│      PathTraversal_Windows.bb
│      Path_Traversal_Spring_Cloud_CVE-2020-5410.bb
│      PHP_RCE.bb
│      Private_SSH_Key.bb
│      Pulse_Secure_CVE-2019-11510.bb
│      RCE_Linux.bb
│      RCE_Parameters.bb
│      RCE_Windows.bb
│      Reflected_values_greater_than_three_characters.bb
│      RegisterUser_parameters.bb
│      Ruby on Rails CVE-2019-5418 - WAF bypass.bb
│      Ruby on Rails CVE-2019-5418.bb
│      Secret-keywords-SecLists.bb
│      Secrets_Request.bb
│      Software_Version.bb
│      solarwinds_default_admin.bb
│      Solarwinds_Orion_Request.bb
│      Solarwinds_Orion_Response.bb
│      Source_code.bb
│      Spring Boot Actuators.bb
│      Springboot_Requests.bb
│      Spring_Cloud_Netflix_SSRF-CVE-2020-5412.bb
│      Spring_Cloud_Path_Traversal_CVE-2019-3799.bb
│      Spring_MVC_Path_Traversal_CVE-2018-1271.bb
│      SQLi.bb
│      SQLi_Collaborator.bb
│      SQLi_Parameters.bb
│      SQLi_TimeBased_append.bb
│      SQLi_TimeBased_replace.bb
│      SQL_Message_Detected.bb
│      SSRF-Collaborator.bb
│      SSRF-URLScheme.bb
│      SSRF_Collaborator_HTTP0_9.bb
│      SSRF_Collaborator_HTTP1_0.bb
│      SSTI.bb
│      SSTI_Parameters.bb
│      Subdomain_takeover.bb
│      SVNFinder.bb
│      Swagger-Finder.bb
│      Swagger_found.bb
│      Swagger_Request.bb
│      Symfony_Debug.bb
│      Symfony_Response.bb
│      tags.txt
│      Test_XSS_append.bb
│      Test_XSS_append_encoded.bb
│      Test_XSS_GET_POST.bb
│      Token_Parameters.bb
│      Tomcat_Groovy_CVE-2020-9484.bb
│      Tomcat_Response_Detection.bb
│      Traefik_Open_Redirect-CVE-2020-15129.bb
│      Traefik_Response.bb
│      URL_as_a_Value.bb
│      URL_Path_as_a_Value.bb
│      UserEnum_parameters.bb
│      UUID_Request.bb
│      vBulletin_Response.bb
│      WAF_Found.bb
│      WebCachePoisoning.bb
│      Weblogic_Request.bb
│      Woody_Wordpress_RCE.bb
│      WordPress detection.bb
│      WordPress_Config_Accessible.bb
│      WordPress_directory_listing.bb
│      WordPress_Duplicator_Plugin_LFI_CVE-2020-11738.bb
│      WordPress_JSmol2WP_SSRF.bb
│      WordPress_Path_Traversal.bb
│      wordpress_users_enum_yoastseo.bb
│      WordPress_user_enum_json.bb
│      WordPress_user_enum_oembed.bb
│      WP_Config.bb
│      X-Headers-Collaborator.bb
│      XSS.bb
│      XSS_CVE-2020-14815.bb
│      XSS_HtmlUrlEncode.bb
│      XSS_Parameters.bb
│      XSS_UrlEncode.bb
│      XXE_Linux.bb
│      XXE_Windows.bb
│
└─rules
        rule_Artica_Web_Proxy_Auth_bypass.bb
        rule_Cisco_Rule.bb
        rule_Citrix_Rule.bb
        rule_CouchDB_Admin_Exposure.bb
        rule_Drupal_Rule.bb
        rule_Firebase Database Rule.bb
        rule_Fortinet_Fortigate.bb
        rule_Jira_Rule.bb
        rule_Kubernetes_Rule.bb
        rule_LFI_Rule.bb
        rule_MAGMI_Remote_Auth.bb
        rule_Netsweeper_CodeInjection.bb
        rule_OpenRedirect_SSRF_Rule.bb
        rule_RCE_Rule.bb
        rule_Solarwinds.bb
        rule_SpringBoot_Rule.bb
        rule_SQLi_Rule.bb
        rule_SSTI_Rule.bb
        rule_Symfony_Rule.bb
        rule_Traefik_Rule.bb
        rule_Weblogic_Rule.bb
        rule_Wordpress_Rule.bb
        rule_XSS_rule.bb

profiles+rules 下载地址

https://yzzpan.com/#sharefile=q5vJOaYo_32433
解压密码:www.ddosi.org

正确使用方法

①下载插件解压.

②打开如下选项选择你解压出来的profiles+rules目录

Burp Bounty配置及规则文件 profiles+rules

③在抓取到的流量页面右键选择此插件即可扫描

Burp Bounty配置及规则文件 profiles+rules

如果其他页面显示如图所示,则成功导入:

Burp Bounty配置及规则文件 profiles+rules
Burp Bounty配置及规则文件 profiles+rules
Burp Bounty配置及规则文件 profiles+rules

转载请注明出处及链接

Leave a Reply

您的电子邮箱地址不会被公开。 必填项已用*标注