Professional

Host Header Inchecktion

This burp extension helps to find host header injection vulnerabilities by actively testing a set of injection types. A scan issue is created if an injection was successful.

Features

  • Active Scanner
  • Manually select a request to check multiple types of host header injections.
  • Collaborator payload: Inject a collaborator string to check for server-side request forgery.
  • Localhost payload: Inject the string "localhost" to check for restricted feature bypass.
  • Canary payload (only manual): Inject a canary to check for host header reflection which can lead to cache poisoning.

Usage

Run an active scan or manually select a request to check:

  1. Go to the HTTP History.
  2. Right-click on the request you want to check.
  3. Extension -> Host Header Inchecktion -> payload type
  4. In case of a successful injection a scan issue is generated

Author

Author

Fabian Binna

Version

Version

1.2.1

Rating

Rating

Popularity

Popularity

Last updated

Last updated

10 February 2023

Estimated system impact

Estimated system impact

Overall impact: Low

Memory
Low
CPU
Low
General
Low
Scanner
Low

You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.

You can view the source code for all BApp Store extensions on our GitHub page.

Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates.

Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.

Go back to BappStore

Note:

Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.