This extension augments Intruder to probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.
- Send your request to Intruder, highlight the payload position of your serialized object, and add a wordlist of Java class names to look for.
- Add the custom intruder payload processor via "Invoke Burp Extension->Classname to GadgetProbe" to convert your payload string (e.g., "org.apache.commons.collections.functors.invokertransformer") to a Java serialized object probe.
- Run the Intruder attack. The results will be sent back via DNS interactions to a Collaborator instance managed by the extension.
- View the results in the GadgetProbe tab.
- Use the "Detect Library Versions" button to detect version signatures on supported libraries (use the "Copy Detect Library Wordlist" button to copy the list to your clipboard).
For more details and wordlists, check out the project on GitHub
To find out how it works, check out this article
|Author||Jake Miller (@theBumbleSec), Bishop Fox|
|Last updated||27 February 2020|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|You can view the source code for this BApp by visiting our GitHub page.|
|Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates.|
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.