Persistent Automated Collaborator
Description
Used for continuous retrieval and saving of Burp Collaborator results.
Useful in DNS exfiltration ^1
Instructions
Note: Make sure to note and replace the "KEY"
- In Burp go to
Project options -> Misc
and checkPoll over unencrypted HTTP
- Open Collaborator:
Burp menu -> Burp Collaborator client
- Run tshark:
sudo tshark -Y http -T fields -e http.request.method -e http.request.uri -e http.host -e http.request.uri
- ‘Poll’ interactions in the Collaborator client and observe following request in tshark:
GET polling.burpcollaborator.net /burpresults?biid=KEY
- Acquire one or more (depending on your needs) Collaborator’s hostnames (number to generate & 'copy to clipboard')
- Now you can retreive (also after closing the Collaborator client) interactions with your Collaboarator’s hostnames by requesting:
curl http://polling.burpcollaborator.net/burpresults?biid=KEY
Filtered Command
Loop Command
while true; do VALUE=$(curl -s -XGET "https://polling.burpcollaborator.net/burpresults?biid=KEY" | cut -d \" -f 24|cut -d . -f 1| tr -d {|tr -d \} ) && if [ -n "$VALUE" ]; then echo $VALUE >> ~/Results/BurpSuite/Collaborator.txt; fi && sleep 1; done
Update (October 23, 2020)
Please also see Collabfiltrator
[^2]: Same person's blog