转自:https://mp.weixin.qq.com/s/UI-abxv9g603ERCrNR2G4A
在挖SRC的过程中敏感信息泄漏是最常见的漏洞之一,但有时我们可能经常会忽略掉一些重要的数据包。因此我们针对Burp编写了一款标记敏感信息的插件,会自动将代理模块中包含敏感信息的数据包标记出来。
有了它,妈妈再也不会担心我挖洞漏掉敏感信息啦!
更新日志:
支持标记身份证信息
支持标记手机号信息
支持标记经纬度信息
修复手机号误报
删除json格式化功能
增加标记IP信息功能
添加INFO标签功能
使用效果:

下载地址:
https://github.com/nian-hua/BurpExtender
Version
1.3
Dependencies
burp
re
关键代码:
1、电话号码判断
def stringIsPhone(string):
iphones = re.findall(r'[%"\'< ](?:13[012]\d{8}[%"\'< ]|15[56]\d{8}[%"\'< ]|18[56]\d{8}[%"\'< ]|176\d{8}[%"\'< ]|145\d{8}[%"\'< ]|13[456789]\d{8}[%"\'< ]|147\d{8}[%"\'< ]|178\d{8}[%"\'< ]|15[012789]\d{8}[%"\'< ]|18[23478]\d{8}[%"\'< ]|133\d{8}[%"\'< ]|153\d{8}[%"\'< ]|189\d{8}[%"\'< ])', string)
if iphones != []:
iphones = set(iphones)
iphoneSet = set()
for i in iphones:
iphoneSet.add(filter(str.isdigit, i))
iphones = ','.join(iphoneSet)
return iphones
return False
2、GPS经纬度信息
def stringIsGps(Xhacker, string): # check GPS information
if Xhacker:
return False
if ("\"longitude\"" in string and "\"latitude\"" in string) or ("\"lat\"" in string and "\"lon\"" in string):
locations = re.findall(r'\d{2,3}\.\d{3,6}', string)
for location in locations:
if 3 < float(location) < 135:
return location
return False
3、身份证信息
def stringIsIdCard(string):
coefficient = [7, 9, 10, 5, 8, 4, 2, 1, 6, 3, 7, 9, 10, 5, 8, 4, 2]
parityBit = '10X98765432'
idcards = re.findall(r'([1-8][1-7]\d{4}[1|2]\d{3}[0|1]\d{1}[1-3]\d{4}[0-9|X|x])', string)
idcardSet = set()
if idcards != []:
for idcard in idcards:
sumnumber = 0
for i in range(17):
sumnumber += int(idcard[i]) * coefficient[i]
if parityBit[sumnumber % 11] == idcard[-1]:
idcardSet.add(idcard)
idcards = ','.join(idcardSet)
return idcards
return False
4、IP地址信息
def stringIsAssets(string):
assets = re.findall(r'\b(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\b', string)
if assets != []:
assetss = set(assets)
assetsSet = set()
for i in assets:
assetsSet.add(i)
assetss = ','.join(assetsSet)
return assetss
return False
转载请注明:jinglingshu的博客 » Burp敏感信息插件V2.0