Awesome
Copyright 2017-2024 usd AG
Licensed under the GNU General Public License, Version 3.0 (the "License"). You may not use this tool except in compliance with the License. You may obtain a copy of the License at https://www.gnu.org/licenses/gpl-3.0.html
Cyber Security Transformation Chef
The Cyber Security Transformation Chef (CSTC) is a Burp Suite extension. It is build for security experts to extend Burp Suite for chaining simple operations on each incoming or outgoing HTTP message. It can also be used to quickly apply custom formatting on each message.
Introduction
Burp Suite is a general known software which provides a wide area of tools and functionality for conducting web application penetration tests. One problem often encountered when using Burp Suite for certain types of web applications is the lack of quick extensibility or the capability of conducting basic operations on incoming or outgoing messages. Burp Suite provides some functionality which can be used to adapt to certain scenarios (i.e. the macro feature), however it is a time consuming process, difficult to learn and error-prone.
With the years we developed a software which provides a GUI which is adapted from the well known CyberChef, providing several small operations which can be chained to conduct a complicated input transformation. The extension eliminates the need of having several plugins for input and output transformations because it is build in a more generic way.
CSTC is especially useful for using already existing capabilities of Burp Suite Professional (Burp Scanner, Backslash Powered Scanner, ...) on web applications using client side calculated MACs, sequence numbers, or similar protections for request validation. However, CSTC does also perfectly interoperate with other Burp Suite features that are available in the Community Edition (Repeater, Intruder, ...).
It is also a great help for analyzing obfuscated HTTP based protocols because it can be used to de- and reobfuscate network traffic passing through the proxy. In this way, the analyst can concentrate on the task of finding vulnerabilities instead of writing a new extension for removing the obfuscation.
The plugin has been successfully tested and decreased the time for performing tedious input and output transformations on HTTP messages.
Prerequisites
CSTC can be used with either Burp Suite Community Edition or Burp Suite Professional.
Installation
CSTC is available inside the Burp Extension Storage (BApp Store) and listed under the name CSTC, Modular HTTP Manipulator. Recently we observed some functionality issues when installing CSTC via BApp Store. These should be fixed by now, but if you encounter additional problems you may want to install CSTC manually.
We suggest to pull the source code and build it yourself, because you should never trust binaries and should always review the code which is used in a productive setting.
However, you can also pull a release from GitHub and install it by adding it to Burp Suite.
Build Process
The build process is fairly easy. It currently requires a installed JDK and Maven to build. You can build the extension with the following commands:
$ git clone https://github.com/usdAG/cstc.git
$ cd cstc
$ mvn package
Maven will automatically load the dependencies for building the extension and will build
a Jar containing all these dependencies. The created Jar file CSTC-X.X.X-jar-with-dependencies
in the target
directory can be
installed in Burp Suite using the Extender->Add->Extensiontype-java
feature.
Usage
The tool uses a GUI which basic idea is similar to the CyberChef. However, it introduces a new concept which we call lanes. The output of a CSTC transformation is always determined from the the last lane which has an active operation. This initially takes getting used to, but quickly feels intuitive. Take a look at our basic tutorial on YouTube and make sure to read our initial CSTC blog post.
UPDATE: Due to some incompatibility issues when installing CSTC via BApp Store, we had to switch to a new variable prefix.
Variables from other lanes have now to be prefixed by $
e.g. like $Outgoing_step1
.
FAQ
How does the CSTC interact with other Extensions?
Requests and responses pass through the extensions in the order that they are listed, from top to bottom (as described here). Depending on the extensions in use, it may make sense to adjust the position of the CSTC. If you want to process a request manipulated by the CSTC in another extension, the CSTC should be positioned above this extension. Conversely, the CSTC should be positioned below an extension if the CSTC is to work with the response processed by the extension in question. Currently the Burp Montoya API doesn't offer a way to change this order automatically, therefore the CSTC cannot influence the interaction with other extensions itself.
Feedback
We gladly appreciate all feedback, bug reports and feature requests. Please understand that this tool is under active development and therefore will probably contain some bugs :)