Similar Request Excluder
Similar Request Excluder is an extension that enables you to automatically reduce the target scope of your active scan by excluding similar (and therefore redundant) requests.
Warning: some users have reported high memory and CPU usage when running the extension on large audits.
Reducing the target scope can be done by ignoring similar HTTP responses from the spider. If two HTTP responses have the same HTML structure it is likely that they have the same code flow and therefore the same security vulnerabilities. By measuring the similarity of HTTP responses it is possible to automatically reduce the target scope by removing the similar (and therefore redundant) HTTP responses.
For more information, please refer to the thesis.
Since version 1.1.0, Similar Request Excluder is completely automated. There is no need to mark your requests as 'out-of-scope' anymore. It will all be done automatically.
- Make sure the extension is enabled by ticking the Status checkbox in the Similar Request Excluder tab.
- Adjust the settings to your needs (default should be sufficient).
- Spider a complete host or a specific branch of a host.
- Now start an active scan and make sure to check remove out-of-scope items.
|Last updated||20 June 2018|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|You can view the source code for this BApp by visiting our GitHub page.|
|Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates.|
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.