TProxer

Erebus

A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.





How
Install
Todo
Join Discord




TProxer

How it works

  • Attempts to gain access to internal APIs or files through a path based SSRF attack.
    For instance https://www.example.com/api/v1/users we try the payload /..;/..;/..;/..;/ hoping for a 400 Bad Request:
  • Then the Algorithm tries to find the potential internal API root with:
    https://www.example.com/api/v1/users/..;/..;/..;/ hoping for a 404 Not Found
  • Then, we try to discover content, if anything is found it performs additional test to see if it’s 100% internal and worth investigating.
  • Supports manual activation through context menu.
  • Payloads are supplied by the user under dedicated tab, default values are stored under query payloads.txt
  • You can also select your own wordlist
  • Issues are added under the Issue Activity tab.

Install

$ git clone https://github.com/ethicalhackingplayground/TProxer
  • Download Jython from:

https://www.jython.org/download.html

  • Load burp, Extender -> Options
  • Go to Python Environment -> Select file -> Select jython.jar
  • Go to Extensions -> Add -> TProx.py

Todo

  • Make a better design
  • Add more customization.

License

TProxer is distributed under MIT License


Join Discord

GitHub

View Github