Persistent Automated Collaborator #
Description #
Used for continuous retrieval and saving of Burp Collaborator results.
Useful in DNS exfiltration 1
Instructions #
Note: Make sure to note and replace the "KEY"
- In Burp go to
Project options -> Misc
and checkPoll over unencrypted HTTP
- Open Collaborator:
Burp menu -> Burp Collaborator client
- Run tshark:
sudo tshark -Y http -T fields -e http.request.method -e http.request.uri -e http.host -e http.request.uri
- ‘Poll’ interactions in the Collaborator client and observe following request in tshark:
GET polling.burpcollaborator.net /burpresults?biid=KEY
- Acquire one or more (depending on your needs) Collaborator’s hostnames (number to generate & 'copy to clipboard')
- Now you can retreive (also after closing the Collaborator client) interactions with your Collaboarator’s hostnames by requesting:
curl http://polling.burpcollaborator.net/burpresults?biid=KEY
Filtered Command #
1 |
|
Loop Command #
1 |
|
Update (October 23, 2020) #
Please also see Collabfiltrator
Last update: January 27, 2021