Skip to content

Burp Suite extension that automates vulnerability identification using user-provided context and find-replace operations.

License

Notifications You must be signed in to change notification settings

iamaldi/SweetBE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SweetBE - Work in Progress

Let's say you are testing a web application and you're manually sending requests to identify IDOR, XSS or SQLi vulnerabilities (to name a few).

With SweetBE you can set clear criteria to replace specific parameters/values. For example, if your current user has access to resource X but it is not supposed to access resource Y, you can create a find & replace criteria to inject the resource Y parameter in each request where resource X identifier is present. In SweetBE this IDOR vulnerability could be tested using the following criteria entry:

[
    {
        "find_what": "X",
        "replace_with": "Y",
        "success_string": "200 OK"
    }
]

If SweetBE detects an HTTP request with the "X" parameter/value, it is going to send an additional request by replacing X with Y and will mark the request/response attack as successful if the response contains the "200 OK" string.

About

Burp Suite extension that automates vulnerability identification using user-provided context and find-replace operations.

Topics

Resources

License

Stars

Watchers

Forks

Languages