Home

Awesome

Build Status Coverity Status

Virtual Host Payload Generator

Burp extension providing a set of values for the HTTP request Host header for the Burp Intruder in order to abuse virtual host resolution.

It's based on the information provided by this article from the Burp team: Cracking the Lens: Targeting HTTP's Hidden Attack-Surface

The idea of the extension is to use the Burp Intruder in order to identify different responses when Host header is abused and then find an potential attack surface.

Usage

Step 1: Send a request to the Intruder then set a placeholder on the Host header and replace the relative URL by the absolute version of the URL on the first line:

Step1

Step 2: Select the Payload Sets from an Extension-generated type and select the Host headers extension payload generator.

Do not forget to uncheck the Payload Encoding option:

Step2

Step3

Step 3: Launch the attack, you can ignore the warning The Host header in the request does not match the specified target host because it's normal in our execution context.

You will see the different responses code, content and size according to the Host header value used as payload:

Step4

Payloads

Payload are stored in the properties file named virtualhost-payload-generator-config.properties, precisely in the following key:

# List (separated by a comma) of the host names to use
# Ports list will be generated from 1 -> 65535
host.header.names=localhost,127.0.0.1,intranet,proxy,mail,exchange,ad,fw,reverse-proxy

Build the extension

The extension is developed using IntelliJ IDEA Community Edition.

Use the following Maven command mvn clean package.

The extension will be available, as a jar file, in the target folder.