Professional
What the extension does
It reads the whole Burp Proxy History, and extract all the headers from requests and responses.
It shows what headers exist for every Host and Endpoint (URL). Clicking on any entry gives more information about the headers of that request and response pair.
There are predefined lists that the user can expand at will, to include different types of headers and the vulnerabilities associated with them (missing security headers, cookies missing security flags, verbose or potentially dangerous headers, etc). This extension will identify every type of vulnerability associated with headers that the user chooses to include (with checkboxes in a configuration window).
A Microsoft Word report is automatically generated with all the findings, including all the remediation and vulnerability information, the occurrences where these headers appear (or are missing in case of missing security headers), including host and endpoint.
For full functionality for this extension, please ensure you have Python3 installed on your machine.
Author |
Author
dh0ck |
---|---|
Version |
Version
1.0 |
Rating |
Rating |
Popularity |
Popularity |
Last updated |
Last updated
22 June 2023 |
Estimated system impact |
Estimated system impact
Overall impact: Low
Memory
Low
CPU
Low
General
Low
Scanner
Low
|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|
You can view the source code for all BApp Store extensions on our GitHub page. |
|
Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates. |
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.