This extension allows tokens to be extracted from a response and replaced in requests. It can use useful for dealing with anti-CSRF tokens, updated expiration times, sessions in an authorization header, etc.
Using Burp Extractor
- If a request requires a value from a response, right click on that request and select 'Send to Extractor'. Then find a response where the client receives this value from, and select 'Send to Extractor'.
- Go to the Extractor tab to view a Comparer-like interface, and select the request and response needed, then click 'Go'.
- Within the newly created tab, highlight the content of the request which needs to be replaced, and the content of the response which contains the value to be inserted. Adjust the scope as necessary, and click 'Turn Extractor on'.
- Once turned on, Extractor will look for occurrences of the regex listed in the request and response panels, and extract or insert data appropriately. It will also update the 'Value to insert' field with the newest value extracted.
Please consult the extension's Github page for a more complete tutorial.
|Last updated||29 October 2018|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|You can view the source code for this BApp by visiting our GitHub page.|
|Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates.|
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.