redhuntlabs / BurpSuite-Asset_History

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

BurpSuite Extension - Asset History

Burp Suite extension to identify the historic URLs of the domains in scope from WayBackMachine. Refer to our blog Asset History using Burp Suite for more details.

To know more about our Attack Surface Management platform, check out NVADR.

Description

The extension acts as a passive scanner which extracts the domain(s) that are in scope, identifies their historic URLs from WayBackMachine and lists them under the issues section. The URLs can be easily copied from their and tested further for security issues.

Setup

  • Setup the python environment by providing the jython.jar file in the 'Options' tab under 'Extender' in Burp Suite.
  • Download the extension.
  • In the 'Extensions' tab under 'Extender', select 'Add'.
  • Change the extension type to 'Python'.
  • Provide the path of the file ‘Asset_History.py’ and click on 'Next'.
  • Add the target domain/URL in Scope.

Usage

  • Add a URL to the 'Scope' under the 'Target' tab. The extension will identify historic URLs for it.

Requirements

Code Credits

A large portion of the base code has been taken from the following sources:

To-Do:

  • Add AlienVault Open Threat Exchange
  • Add Domain History
  • Add IP History

License

The project is available under MIT license, see LICENSE file.

About

License:MIT License


Languages

Language:Python 100.0%