Burpsuite for Pentester: Logger++
In this article, we’ll learn about a powerful Burp Extension cool tool called “Burp Logger++”. It is like a super detective for websites, always on the lookout for any hidden problems. It is an extra feature that you can add to Burp, which lots of web experts use to find issues on websites.
Suppose you are a web explorer, and you want to know everything about a website. Burp Logger++ is like your trusty notebook. It is super helpful because it has a magical filter. You can tell it what kind of information you are looking for, and it will only show you those things.
With Burp Logger++, you can also color-code things. Think of it like using different colors to highlight the most important parts of a picture. This helps you spot the important stuff quickly.
- Setting Up & Navigating
- Query-Based Filter
- Filter Library
- Regex-Based Filter
- Export Data Feature
Setting Up & Navigating
You can download and install the extension from the BApp Store. Go to Extensions > Bapp Store. Here, search for Logger++ or simply scroll down.
Click on it, on the right side scroll down and install it.
After successful installation, it will appear on the toolbar.
There are a lot of options visible to you. First, let’s explore the “Options” tab to discover what advanced settings are included in this extension.
Navigate to “Options” to see the various log filter options. It allows you to customize logging setting as per your preference.
Logger++ is running by default. Here are some other important settings:
- Log Filter: This feature lets you specifically choose the requests that you don’t need to record for analysis, or you may turn it off when not in use.
- Log From: It enables you to capture data from the specific logs that you want to capture.
- Import: You can import log data from CSV and OWASP ZAP reports with this function.
- Export: The log data can be exported for further analysis.
Depending on your preferences, you can use different configurations. We are sticking with the default settings for the time being.
The View Log tab contains all the logs. Using this website “vulnweb” as an example, browse it and simply scan the entire site; all logs will show up here under the View Logs page.
Now, go to Signup. To capture the logs for credentials, enter the test login details.
then click on “Login”.
Let’s update some more details to capture more requests for further analysis.
You can see that all requests have been captured here in View Logs.
You can use filter to selectively view or manipulate HTTP requests and responses. These filters help you focus on specific aspects of the web traffic and are especially useful during security testing. The working is based on query string. It accepts a logical query and returns output based on them.
You have some advanced choices with the filter options:
Entry: You can apply filters according to number, tool, tags, InScope, and other criteria.
Request: It lets you filter just the request itself using many options such as header, body, URL, method, parameters, cookies, etc. As shown below:
Response: It lets you filter just the response by using various options such as header, body, Inferred Type, Method, Parameters, cookies etc. As shown below:
Scenario 1: Let’s suppose you just want to view HTTP POST requests from all logs. It is understood that HTTP POST parameters are in HTTP Request.
Go to Filter bar > right click > Select Request > Select Method
The method has been chosen and is visible in the filter bar.
Request.Method == "POST"
And hit enter. As result, Only HTTP POST Method requests appear.
Scenario 2: Taking another example, suppose we just want to view the requests which contains any username information from all logs.
Go to Filter bar > right click > Select Request > Select Body
Request.Body CONTAINS "uname"
As a result, the following request is highlighted:
Below are some useful queries which are helpful during penetration testing.
JSON Injection (Check for only JSON request)
Response.InferredType == "json"
Injections Attack (Check for HTML, XML, JSON)
Response.InferredType IN ["json", "html", "xml"]
Sensitive File Exposed
Response.Body CONTAINS [".git", ".config", ".zip", ".swf", ".doc", ".pdf", ".xlsx", ".csv", ]
Sensitive Path Exposed
Request.Path CONTAINS ["/git", "/etc", "/var"] Request.Path MATCHES "/account*"
Sensitive Parameter in Query String
Request.Path CONTAINS ["id", "username", "password", "role", "IsAdmin"]
Sensitive Parameter in Request
Request.Body CONTAINS ["id", "username", "password", "token", "role", "EnterpriseID", "IsAdmin"]
Server Information Disclosed
Response.header CONTAINS "Server:"
Response.Header MATCHES "Access-Control-Allow-Origin: *"
Check for CSRF Token
Request.Method == "POST" AND Request.Body CONTAINS "csrf"
Request.Path MATCHES "/robots.txt"
Request.Path CONTAINS ["redirect=", "page=", "url=", "index.page="]
We can use the saved or pre-configured filters from the library directly with the help of the Filter Library. When you start testing, you do not have to manually type or remember the query string of filter pattern.
Click on “Add Snippet”. Here are two values that must be added.
- Alias: Put any Alias name for your query string.
- Snippet: Add query string here.
As you can see below, I have added a filter for
Request_Type: Request.Method == "POST"
You no longer have to type repeatedly to find only POST requests. You can color-code this request so that the highlighted request stands out among all captured requests on the View Logs page.
Click on Use as Color LogFilter > Select Background Color > check Enable and save it.
All POST requests are now highlighted in “Dard-Red” on this page.
Similarly, you can save whole test scenarios in the Filter Library. There is two ways to call the saved filter:
Method 1: In Filter Library, click on Set as LogFilter.
It will directly run the query and the desire result will be displayed.
Method 2: Use “#” with Alias name directly in filter bar.
And hit enter. The equivalent outcome will appear as follows:
Burp Logger’s regex filter is a powerful feature that helps web security professionals pinpoint specific data within the vast sea of information during security testing.
You need to specify the regular expression (regex) pattern. This pattern acts like a search query, telling Burp Logger++ what kind of data you want to capture. You can create regex expression pattern to find data as like Email Address, IP Address, Server-side error messages, Software version disclosed, Any API Key exposed etc.
Go to Logger++, click on Grep Values tab. Here, you can see more filters to limit the search criteria.
- Search Response = It will perform search only in responses.
- Search Request = It will perform search only in requests.
- In Scope Only = If you added the target URL in Scope only then it will only search within the scoped target.
For the time being, choose to search through every request and response. Let’s take an example, if you want to find email addresses in web traffic, your regex pattern might look like
Directly paste this expression under Regex bar and press enter.
Consequently, the /userinfo.php request — which includes the email mentioned above is displayed.
You have two ways: Manually search through the complete request/response or click on Unique Result. The results that match the regex expression will be displayed only in Unique Results.
Similarly, Let’s check for IP Addresses,
It is evident that a POST request is being sent through the IP address 10.10.1.10.
In the same way, you can check for other important information like if you want to find the web traffic contains any FTP, HTTP, WWW.
For reference, the following link includes helpful regex expression to find the disclosed server version within the error information.
Export Data Feature
Burp Logger’s data export feature is a valuable tool for web security professionals. It allows you to save, analyze, and share the captured data efficiently, making it an essential tool for documenting findings, performing in-depth analysis, and collaborating with others in the field of web security.
Why Export Data Feature is Helpful?
- Data Preservation: Exporting data from the Logger++ allows you to save a record of your testing session. This is essential for documentation and analysis.
- External Analysis: By exporting data, you can use external tools or software to perform in-depth analysis, generate reports, or share findings with team members.
- Archiving Evidence: It helps in preserving evidence of potential vulnerabilities or security issues discovered during testing, which is crucial for audits and compliance.
- Collaboration: Exported data can be easily shared with colleagues or experts for collaborative analysis, making it an asset in team-based security testing.
- Customization: Depending on the export format chosen, you can tailor the exported data to meet specific reporting or analysis requirements.
- Base64 JSON Format: Base64-encoded data is often used to include binary data within a JSON structure.
- JSON Format: JSON is a lightweight data-interchange format used for structured data.
- CSV Format: CSV files are widely supported and can be opened in spreadsheet software like Microsoft Excel or Google Sheets.
- HAR Format: HTTP Archive (HAR) format is used for capturing and storing the performance-related data. The HAR format contains detailed information about HTTP requests and responses.
For Example, suppose you want to export all POST requests for further analysis.
Select the associate requests > right click > choose Export entries as > Export as CSV
Now Select All > Choose Save > Enter the name and click on Ok.
Save the result to your system offline. You can examine the CSV file; it contains all of the values that you chose to save.
You may select the only required values to store based on your needs.
That’s All, Cheers!!!
People like Burp Logger++ because it makes their job easier. It is your smart friend who helps you find hidden treasures (or problems) on websites. With its filters and colorful highlights, has the superpowers for website exploration.
So, if you are a web detective, it is a tool that will make your job much more fun and efficient. Give it a try and see how it can help you on your web adventures!
Author: Megha is a Certified Security Professional with extensive experience. She is a passionate Researcher and Technical Writer at Hacking Articles. Contact here.