Setting up Macro for intruder
Last updated
Last updated
The provided text describes an advanced credential-stuffing attack using Burp Suite's Intruder and Macro functionalities. To execute this, follow these instructions:
Setting Up the Request Capture:
Start by capturing a login request to http://10.10.129.2/admin/login/
.
Note the response, especially the session cookie and CSRF token, which are dynamic.
Configuring the Intruder:
With the Burp Proxy, intercept and capture the login request.
In Intruder, set up the attack:
Use the "Pitchfork" attack type.
Only select the username and password fields, leaving the session cookie and CSRF token fields unselected.
Loading Payloads:
Go to the Payloads tab in Intruder.
Load your username and password wordlists.
Setting Up the Macro:
Navigate to the "Settings" tab and select "Sessions".
Under "Macros," add a new macro.
Choose a GET request to http://10.10.129.2/admin/login/
from your history.
Name the macro appropriately.
Configuring Session Handling Rules:
Under "Session Handling Rules," add a new rule.
In the Scope tab:
Enable only for Intruder.
Set URL scope to "Use suite scope" or define a custom scope for http://10.10.129.2/
.
In the Details tab, under "Rule Actions":
Add the "Run a Macro" action.
Select the macro you created.
Specify to update only the "loginToken" parameter and the "session" cookie.
Launching the Attack:
Return to Intruder and start the attack.
Monitor for 302 status code responses; 403 errors indicate a problem with the macro.
Sort responses by length to identify successful login attempts, which should be notably shorter
This lab Credit goes to Try Hack Me on Burp Intruder Page TASK 12: The Extra Mile.