mirror of
https://github.com/Mr-xn/BurpSuite-collections.git
synced 2025-05-06 10:41:27 +00:00
update readme.md & add jsEncrypter.0.2 Plugin
This commit is contained in:
parent
363801e194
commit
2ff3fff636
8
Burp_start_en.bat
Normal file
8
Burp_start_en.bat
Normal file
@ -0,0 +1,8 @@
|
||||
rem 启动英文版Burp
|
||||
chcp 936
|
||||
rem 设置936编码防止某些中文路径导致批处理失效
|
||||
@echo off
|
||||
rem 必须切到根目录执行才行
|
||||
cd \
|
||||
start javaw -Dfile.encoding=utf-8 -Xbootclasspath/p:%~dp0\burp-loader-keygen.jar -Xmx1024m -jar %~dp0\burpsuite_pro_v1.7.37.jar
|
||||
exit
|
69
Create Desktop Link.bat
Normal file
69
Create Desktop Link.bat
Normal file
@ -0,0 +1,69 @@
|
||||
chcp 936
|
||||
REM 设置936编码防止某些中文路径导致批处理失效
|
||||
@echo off
|
||||
setlocal enabledelayedexpansion
|
||||
mode con cols=90 lines=30&color 0a&title 创建Burp Suite一键启动【英文原版】脚本快捷方式
|
||||
echo ======================================================
|
||||
echo m m mm m m
|
||||
echo ## ## m mm m m m mm #"m # mmm mm#mm
|
||||
echo # ## # #" " #m# #" # # #m # #" # #
|
||||
echo # "" # # m#m # # # # # #"""" #
|
||||
echo # # # m" "m # # # # ## "#mm" "mm
|
||||
echo =======================================================
|
||||
echo.
|
||||
echo [+] 感谢破解作者^&汉化作者^&Burp官方^&各个插件作者^&感谢EveryOne!
|
||||
echo.
|
||||
echo [+] 欢迎各位朋友光临我博客@_@:https://mrxn.net
|
||||
echo.
|
||||
echo [+] 获得当前路径:%~dp0
|
||||
set path=%~dp0Burp_start_en.bat
|
||||
echo.
|
||||
if exist %path% (
|
||||
echo [+] 发现Burp【英文原版】一键启动脚本Burp_start_en.bat
|
||||
echo.
|
||||
echo [+] 启动脚本路劲:
|
||||
echo.
|
||||
echo [+] %path%
|
||||
echo.
|
||||
goto :creat
|
||||
) else (
|
||||
echo [-] 注意,未发现【英文原版】启动脚本Burp_start_en.bat,请注意是否改名,程序退出...
|
||||
echo.
|
||||
pause
|
||||
exit
|
||||
)
|
||||
|
||||
:creat
|
||||
echo [+] 开始创建快捷方式...
|
||||
echo.
|
||||
rem 设置程序的完整路径(必要)
|
||||
set Program=%path%
|
||||
rem 设置快捷方式名字(必要)
|
||||
set LinkName=Burp_Suite_En
|
||||
rem 程序工作路径
|
||||
set WorkDir=%~dp0
|
||||
rem 设置快捷方式说明
|
||||
set Desc=BurpSuite【英文原版】一键启动
|
||||
rem 设置【英文原版】快捷方式图标
|
||||
set icon=%~dp0Goescat-Macaron-Burp-suite.ico
|
||||
if not defined WorkDir call:GetWorkDir "%Program%"
|
||||
(echo Set WshShell=CreateObject("WScript.Shell"^)
|
||||
echo strDesKtop=WshShell.SpecialFolders("DesKtop"^)
|
||||
echo Set oShellLink=WshShell.CreateShortcut(strDesKtop^&"\%LinkName%.lnk"^)
|
||||
echo oShellLink.TargetPath="%Program%"
|
||||
echo oShellLink.WorkingDirectory="%WorkDir%"
|
||||
echo oShellLink.WindowStyle=1
|
||||
echo oShellLink.Description="%Desc%"
|
||||
echo oShellLink.IconLocation="%icon%"
|
||||
echo oShellLink.Save)>makelnk.vbs
|
||||
echo [+] 【英文原版】桌面快捷方式创建成功!!
|
||||
echo.
|
||||
makelnk.vbs
|
||||
del /f /q makelnk.vbs
|
||||
pause
|
||||
goto :eof
|
||||
:GetWorkDir
|
||||
set WorkDir=%~dp1
|
||||
set WorkDir=%WorkDir:~,-1%
|
||||
pause
|
||||
goto :eof
|
25
README.md
25
README.md
@ -4,13 +4,15 @@
|
||||
|
||||
#### 起因
|
||||
|
||||
前阵子在**先知**上有朋友发了一个汉化的教程,但是需要手动输入这些命令而且还容易出错,故,我在此基础上写了个一键自动生成桌面快捷方式加上汉化启动。先上图各位看看效果:
|
||||
前阵子在**先知**上有朋友发了一个汉化的教程,但是需要手动输入这些命令而且还容易出错,故,我在此基础上写了个一键自动生成桌面快捷方式加上汉化启动。先上图:汉化+桌面快捷方式的一键启动效果:
|
||||
|
||||

|
||||
|
||||
##### 使用方法:
|
||||
|
||||
只针对 `Windows` 而言:直接 `Download` 项目所有文件 双击 `创建桌面快捷方式.bat` 即可自动创建桌面快捷方式:<img src="https://raw.githubusercontent.com/Mr-xn/Burp-Suite-collections/master/Goescat-Macaron-Burp-suite.ico" width="32" height ="32" align=right />
|
||||
如果你习惯`【推荐】`英文不想使用汉化版的,直接运行`Create Desktop Link.bat` 即可创建英文版的桌面快捷方式,当然你也可以两个都创建。*(汉化版在某些插件上面会出现各种 **UI** **BUG** ,如果你的 Burp 界面出现了 BUG 请切换英文原版试试)*
|
||||
|
||||
只针对 `Windows` 而言:直接 `Download` 项目所有文件 双击 `创建桌面快捷方式.bat` 即可自动创建`汉化版`桌面快捷方式:<img src="https://raw.githubusercontent.com/Mr-xn/Burp-Suite-collections/master/Goescat-Macaron-Burp-suite.ico" width="32" height ="32" align=right />
|
||||
|
||||
如果需要替换图标,要么名字和现在的一样,要么就修改 `创建桌面快捷方式.bat` 里面大约 48 行的 图标名字:
|
||||
|
||||
@ -21,22 +23,35 @@
|
||||
```
|
||||
|
||||
+--- books
|
||||
| +--- 利用burp插件Hackvertor绕过waf并破解XOR加密 - 嘶吼 RoarTalk
|
||||
| +--- Configuring Burp Suite with Android Nougat.pdf
|
||||
| +--- Burp Suite使用 _ Pa55w0rd 's Blog.pdf
|
||||
| +--- burpsuite实战指南.pdf
|
||||
| +--- Configuring Burp Suite with Android Nougat.pdf
|
||||
| +--- nmap-man-page.pdf
|
||||
| +--- Nmap渗透测试思维导图.png
|
||||
| +--- readme.md
|
||||
| +--- 利用burp插件Hackvertor绕过waf并破解XOR加密 - 嘶吼 RoarTalk.pdf
|
||||
+--- burp-loader-keygen.jar
|
||||
+--- BurpSuiteCn.jar
|
||||
+--- burpsuite_pro_v1.7.37.jar
|
||||
+--- BurpSuite破解版汉化脚本.gif
|
||||
+--- Burp_start.bat
|
||||
+--- Burp_start_en.bat
|
||||
+--- cn.txt
|
||||
+--- Create Desktop Link.bat
|
||||
+--- Goescat-Macaron-Burp-suite.ico
|
||||
+--- Mrxn's Blog.url
|
||||
+--- plugins
|
||||
| +--- burp-vulners-scanner-1.2.jar
|
||||
| +--- bypasswaf.jar
|
||||
| +--- chunked-coding-converter.0.2.1.jar
|
||||
| +--- jsEncrypter.0.2
|
||||
| | +--- jsEncrypter.0.2.jar
|
||||
| | +--- jsEncrypter_readme.pdf
|
||||
| | +--- nodejs_server.js
|
||||
| | +--- phantomjs_server.js
|
||||
| | +--- README.md
|
||||
| | +--- 对登录中账号密码进行加密之后再传输的爆破的思路和方式 - FreeBuf互联网安全新媒体平台.pdf
|
||||
| | +--- 编写加密传输爆破插件jsEncrypter _ 回忆飘如雪.pdf
|
||||
| +--- Readme.md
|
||||
| +--- sqlmap.jar
|
||||
+--- plugins.png
|
||||
@ -63,6 +78,8 @@ chunked-coding-converter.0.2.1.jar 国人c0ny1最新版 burp分块输出,也
|
||||
|
||||
sqlmap.jar 联合本地sqlmap 进行注入测试,当然burp插件商店上还有一款 sqli-py(地址:https://github.com/portswigger/sqli-py)可以直接安装就不叙述了
|
||||
|
||||
jsEncrypter.0.2 --- jsEncrypter 使用 `phantomjs` 调用前端加密函数对数据进行加密,方便对加密数据输入点进行fuzz
|
||||
|
||||
#### 相关教程书籍:
|
||||
|
||||
Burp Suite 实战指南 (在线版本):https://t0data.gitbooks.io/burpsuite/content/
|
||||
|
BIN
plugins.png
BIN
plugins.png
Binary file not shown.
Before Width: | Height: | Size: 6.4 KiB After Width: | Height: | Size: 30 KiB |
23
plugins/jsEncrypter.0.2/README.md
Normal file
23
plugins/jsEncrypter.0.2/README.md
Normal file
@ -0,0 +1,23 @@
|
||||
# [jsEncrypter](<https://github.com/c0ny1/jsEncrypter>)
|
||||
|
||||
本插件使用 `phantomjs` 调用前端加密函数对数据进行加密,方便对加密数据输入点进行fuzz。
|
||||
|
||||
#### 引用自 [此项目作者 c0ny1 大佬的readme](<https://github.com/c0ny1/jsEncrypter/blob/master/README.md>)
|
||||
|
||||
我只是搬运收集,其他的所有权归原作者 `c0ny1` 所有。
|
||||
|
||||
> 除了`jsEncrypter.0.2.jar` 插件文件,还包括三个PDF文件:
|
||||
>
|
||||
> > jsEncrypter_readme.pdf --- 顾名思义就是 jsEncrypter 的 readme 副本
|
||||
> >
|
||||
> > 编写加密传输爆破插件jsEncrypter _ 回忆飘如雪.pdf --- [这个插件的又来以及使用方法](http://gv7.me/articles/2017/jsEncrypter/)
|
||||
> >
|
||||
> > [对登录中账号密码进行加密之后再传输的爆破的思路和方式 - FreeBuf互联网安全新媒体平台](<https://www.freebuf.com/articles/web/127888.html>)
|
||||
|
||||
## 相关文章
|
||||
|
||||
- [编写加密传输爆破插件jsEncrypter](http://gv7.me/articles/2017/jsEncrypter/)
|
||||
- [快速定位前端加密方法](http://gv7.me/articles/2018/fast-locate-the-front-end-encryption-method/)
|
||||
- [解决jsEncrypter脚本错误代码不报错问题](http://gv7.me/articles/2018/solve-jsEncrypter-script-error-code-is-not-wrong/)
|
||||
- [jsEncrypter的Node.js版server脚本](http://gv7.me/articles/2018/jsEncrypter-nodejs-server-script/)
|
||||
|
BIN
plugins/jsEncrypter.0.2/jsEncrypter.0.2.jar
Normal file
BIN
plugins/jsEncrypter.0.2/jsEncrypter.0.2.jar
Normal file
Binary file not shown.
BIN
plugins/jsEncrypter.0.2/jsEncrypter_readme.pdf
Normal file
BIN
plugins/jsEncrypter.0.2/jsEncrypter_readme.pdf
Normal file
Binary file not shown.
48
plugins/jsEncrypter.0.2/nodejs_server.js
Normal file
48
plugins/jsEncrypter.0.2/nodejs_server.js
Normal file
@ -0,0 +1,48 @@
|
||||
/**
|
||||
* author: c0ny1
|
||||
* date: 2018-4-14
|
||||
* file: nodejs_server.js
|
||||
*/
|
||||
var http = require('http');
|
||||
var querystring = require('querystring');
|
||||
var host = '127.0.0.1'; //地址
|
||||
var port = '1664'; //端口
|
||||
//require('your_encrypte_script.js'); /*引入实现加密的js文件*/
|
||||
require('./sha384.js');
|
||||
// 处理函数
|
||||
function js_encrypt(payload){
|
||||
var newpayload;
|
||||
/**********在这里编写调用加密函数进行加密的代码************/
|
||||
|
||||
/**********************************************************/
|
||||
return newpayload;
|
||||
}
|
||||
var server = http.createServer(function(request,response){
|
||||
if(request.method === 'POST'){
|
||||
var postData = '';
|
||||
request.on('data',function(params){
|
||||
postData += params;
|
||||
});
|
||||
|
||||
request.on('end',function(){
|
||||
var dataString = postData.toString();
|
||||
var dataObj = querystring.parse(dataString);
|
||||
var payload = dataObj.payload;
|
||||
var encrypt_payload = js_encrypt(payload);
|
||||
console.log('[+] ' + payload + ':' + encrypt_payload);
|
||||
|
||||
response.statusCode = 200;
|
||||
response.write(encrypt_payload);
|
||||
response.end();
|
||||
});
|
||||
}else{
|
||||
response.statusCode = 200;
|
||||
response.write("^_^\n\rhello jsEncrypter!");
|
||||
response.end();
|
||||
}
|
||||
});
|
||||
server.listen(port, host, function () {
|
||||
console.log("[!] ^_^");
|
||||
console.log("[*] nodejs server start!");
|
||||
console.log("[+] address: http://"+host+":"+port);
|
||||
});
|
59
plugins/jsEncrypter.0.2/phantomjs_server.js
Normal file
59
plugins/jsEncrypter.0.2/phantomjs_server.js
Normal file
@ -0,0 +1,59 @@
|
||||
/**
|
||||
* author: c0ny1
|
||||
* date: 2017-12-16
|
||||
*/
|
||||
|
||||
var webserver = require('webserver');
|
||||
server = webserver.create();
|
||||
|
||||
var host = '127.0.0.1';
|
||||
var port = '1664';
|
||||
|
||||
// 加载实现加密算法的js脚本
|
||||
var wasSuccessful = phantom.injectJs('xxx.js');/*引入实现加密的js文件*/
|
||||
|
||||
// 处理函数
|
||||
function js_encrypt(payload){
|
||||
var newpayload;
|
||||
/**********在这里编写调用加密函数进行加密的代码************/
|
||||
|
||||
/**********************************************************/
|
||||
return newpayload;
|
||||
}
|
||||
|
||||
if(wasSuccessful){
|
||||
console.log("[*] load js successful");
|
||||
console.log("[!] ^_^");
|
||||
console.log("[*] jsEncrypterJS start!");
|
||||
console.log("[+] address: http://"+host+":"+port);
|
||||
}else{
|
||||
console.log('[*] load js fail!');
|
||||
}
|
||||
|
||||
var service = server.listen(host+':'+port,function(request, response){
|
||||
try{
|
||||
if(request.method == 'POST'){
|
||||
var payload = request.post['payload'];
|
||||
var encrypt_payload = js_encrypt(payload);
|
||||
console.log('[+] ' + payload + ':' + encrypt_payload);
|
||||
response.statusCode = 200;
|
||||
response.write(encrypt_payload.toString());
|
||||
response.close();
|
||||
}else{
|
||||
response.statusCode = 200;
|
||||
response.write("^_^\n\rhello jsEncrypter!");
|
||||
response.close();
|
||||
}
|
||||
}catch(e){
|
||||
//console.log('[Error]'+e.message+' happen '+e.line+'line');
|
||||
console.log('\n-----------------Error Info--------------------')
|
||||
var fullMessage = "Message: "+e.toString() + ':'+ e.line;
|
||||
for (var p in e) {
|
||||
fullMessage += "\n" + p.toUpperCase() + ": " + e[p];
|
||||
}
|
||||
console.log(fullMessage);
|
||||
console.log('---------------------------------------------')
|
||||
console.log('[*] phantomJS exit!')
|
||||
phantom.exit();
|
||||
}
|
||||
});
|
Binary file not shown.
BIN
plugins/jsEncrypter.0.2/编写加密传输爆破插件jsEncrypter _ 回忆飘如雪.pdf
Normal file
BIN
plugins/jsEncrypter.0.2/编写加密传输爆破插件jsEncrypter _ 回忆飘如雪.pdf
Normal file
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user