The default configuration has a list of regular expression and file extension. To see the predefined list go to Options TAB. Here you can choose which of them activate or not or you can choose to insert your own regular expression or file extension. For both of them there are a list of actions to interact with them. The actions are:
- Reset: the plugin will reset the default list of regular expression or file extension.
- New: a pop-up will appear and offer the opportunity to insert a new regular expression or file extension.
- Delete: after selecting a row, this will be deleted from the list.
- Clear: the plugin will clear the list leave them empty.
- Open: a pop-up will appear and offer the opportunity to insert in bulk a list of regular expression or file extension from a file.
- Save: the plugin offer the possibility to save your custom list for future tests. After you have select your own desired configuration you can start to find sensitive informations inside HTTP messages. The plugin will be execute in two different modes:
- Analyze HTTP History: the plugin will parse all http history generated from that moment and it will find any active pattern
- Live: the plugin will parse request by request as the user will generates one from his web browser.
|Last updated||12 November 2021|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|You can view the source code for this BApp by visiting our GitHub page.|
|Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates.|
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.