This extension augments your proxy traffic by injecting non-invasive headers designed to reveal backend systems by causing pingbacks to Burp Collaborator.
To use it, simply install it and browse the target website. Findings will be presented in the 'Issues' tab.
For further information, please refer to the whitepaper at http://blog.portswigger.net/2017/07/cracking-lens-targeting-https-hidden.html
|Last updated||18 September 2017|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.