# Burp Suite: Intruder

**Task 1: Introduction**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FfYhMUylUlXSycIARDNu4%2Fimage.png?alt=media&#x26;token=7f32f168-161c-4548-b35e-b26d948f0b25" alt=""><figcaption></figcaption></figure>

**Task 2: What is intruder**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2Fvu43zcDbYa7vhfNHpo5Y%2Fimage.png?alt=media&#x26;token=c013562f-3a33-404b-844a-4f4eeba1341e" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F6sUdnDH6bxNqGcvMwrNR%2Fimage.png?alt=media&#x26;token=9ac1d971-e349-4045-95ae-ceef2d8cebcc" alt=""><figcaption></figcaption></figure>

**Task 3: Positions**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FrSGAakMwRApjNiY3K1Rx%2Fimage.png?alt=media&#x26;token=70a6c7df-0265-4eaf-b542-548f09f99d93" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FoUWRlHMK8ejejjFMnLPw%2Fimage.png?alt=media&#x26;token=966f6451-4d2f-4d11-af6a-4508b01ab0cb" alt=""><figcaption></figcaption></figure>

**Task 4: Payloads**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FpTEVsvhDELpzBs8ufKuO%2Fimage.png?alt=media&#x26;token=2956978f-a30a-42da-89a5-b5457d28ec39" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FxUph9uwPcgDO5Sy856iy%2Fimage.png?alt=media&#x26;token=5122d4bc-0c94-4d7b-b8e9-cb5758aa3a3b" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FcAOaBdq3m94FKMBkuAx6%2Fimage.png?alt=media&#x26;token=80277065-0ff3-427a-8e9a-0c100b881bc7" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FVgzIjGI7Wv9zuRfT0rXG%2Fimage.png?alt=media&#x26;token=bd89fd51-50be-4c41-b50c-2ec24a4f93f5" alt=""><figcaption></figcaption></figure>

**Task 5: Sniper**&#x20;

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FAlAaaBzaDtSYBH0txtkM%2Fimage.png?alt=media&#x26;token=4b1f5e9e-5ad8-417a-acab-80931d08766f" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FsQqmx6tBSQ9jtpFZ44D8%2Fimage.png?alt=media&#x26;token=5bd2a72e-82c7-4352-92a4-4f4c7a308908" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FJ1NfrRAcktXnPvbkPpPI%2Fimage.png?alt=media&#x26;token=6e8e6fad-dcbf-4301-a484-64ca1c7ee51a" alt=""><figcaption></figcaption></figure>

**Task 6: Battering Ram**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FPZRs2WjuIsWI7zl9ec9j%2Fimage.png?alt=media&#x26;token=31887d94-a41a-48ae-b6c2-610c27274cbe" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FM82w8XanT6Lp1HHyUsSo%2Fimage.png?alt=media&#x26;token=2728c499-ad51-4cd3-9f7a-2d86befe5458" alt=""><figcaption></figcaption></figure>

**Task 7: Pitchfork**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F6PGMhHdNFOfOC89JHw5d%2Fimage.png?alt=media&#x26;token=86a7c133-059b-4b00-b11f-fc14d96ece55" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F6qY6FHtDlHK2DJTDgPY0%2Fimage.png?alt=media&#x26;token=34b1b933-8cb7-4eb4-ae7e-5709bd0adfdc" alt=""><figcaption></figcaption></figure>

**Task 8: Cluster Bomb**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FBpBSO7xuvi6FKFGc7Tuj%2Fimage.png?alt=media&#x26;token=535e3bab-60b8-434d-8481-8ec121287715" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FsmA680PZKPdZruD0HAnh%2Fimage.png?alt=media&#x26;token=d47ff7cb-2e76-4ad6-92e1-3d641004aba3" alt=""><figcaption></figcaption></figure>

**Task 9: Introduction to Attack Types**

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F0LIdkIP2gkqffYURHRVc%2Fimage.png?alt=media&#x26;token=18b9a239-1420-42e4-9dc7-9215f712d4f2" alt=""><figcaption></figcaption></figure>

**Task 10: Practical Example**

First we have to download the leak credentials in the Bastion Hosting

We will using wget command to retrieve the zip file and just unzip it

```
wget http://10.10.114.29:9999/Credentials/BastionHostingCreds.zip
unzip BastionHostingCreds.zip
```

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FVxu2SQivOOKrH5Vpj71D%2Fimage.png?alt=media&#x26;token=a1ebb7e6-b627-4045-a1ce-0c9e20349619" alt=""><figcaption></figcaption></figure>

Then in the login form we are going to input some random stuff in the username and password parameter&#x20;

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FCHrzCHBYZN3WJCviIz39%2Fimage.png?alt=media&#x26;token=1345c9fd-a30d-436e-a744-361e912b0bb3" alt=""><figcaption></figcaption></figure>

We will catch the POST method from the website using Burpsuite and forward this request to intruder section

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FgkCF7tirvvIPaZFLQBOG%2Fimage.png?alt=media&#x26;token=71b945ab-21ec-4336-90af-d2712b3015be" alt=""><figcaption></figcaption></figure>

Then we are going to put section sign symbol in both username and password as you can see below.

We also going to use the Pitch Fork attack type which will read the username.txt and password.txt simultaneously. This attack will simultaneously input the word from the wordlist to the given parameters

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FD7RNYp8TtUORiMJ9KsWZ%2Fimage.png?alt=media&#x26;token=bc1b6645-9c59-41a8-9058-658ce8f253e6" alt=""><figcaption></figcaption></figure>

First Payload set we will specify the username.txt that will go to username parameter

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FLAC44pjkO9eWWuQzmxLx%2Fimage.png?alt=media&#x26;token=896ba673-6718-47ad-8582-e64a96211c77" alt=""><figcaption></figcaption></figure>

Then the second payload set we will specify the password.txt that will go to password parameter

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FV7g97Qf5Eyzpk1yKLi3s%2Fimage.png?alt=media&#x26;token=9b057afe-4480-4f91-b135-436f6d131555" alt=""><figcaption></figcaption></figure>

After that we star the attack we can see here that there is a differnt length of size of the byte from the POST request. That notify us that credential actually goes through the system and it does not return fail status

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FgE5enwxp10tbzMxQSk1c%2Fimage.png?alt=media&#x26;token=e2dc8572-960f-4352-8d12-9065b7cc4c20" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FfkHL1UjX65Jg39m6Hnvy%2Fimage.png?alt=media&#x26;token=8ba104c9-ea08-4340-aea8-0c54ceb89ae1" alt=""><figcaption></figcaption></figure>

**Task 11: Practical Challenge**

First we have to login for us to have a user in the website

* m.rivera
* letmein1

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FNjk1rb1Tw0WEMIjFU8C6%2Fimage.png?alt=media&#x26;token=ea841706-f86f-4435-a666-20c42500354a" alt=""><figcaption></figcaption></figure>

As we logged in we will see the support section of the website where we can see bunch of assigned tickets.&#x20;

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F8ruGyfCfvl2GGqnSa0K9%2Fimage.png?alt=media&#x26;token=276417bc-c146-4622-844d-4513b676db24" alt=""><figcaption></figcaption></figure>

By looking at the ticket 78 we can see some query or the message from the email.

As you can see at the top we can change the parameter from 78 to any number that we want

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FhrWUmuzqFeIxTAwEhPd9%2Fimage.png?alt=media&#x26;token=ce1d1895-e131-479a-aded-4d1873c55ea3" alt=""><figcaption></figcaption></figure>

Therefore, we are going to intercept the GET request from the website so that we can navigate to different ticket number ranging from 1 - 100.

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FdFqnObdFwA4g0VGkai1v%2Fimage.png?alt=media&#x26;token=1ac897f0-658a-4c63-a66f-557e166ed2b8" alt=""><figcaption></figcaption></figure>

Then we just forward this to intruder so that we can fuzz some number

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FqjcLJm84EuRpstwxTQBG%2Fimage.png?alt=media&#x26;token=c7dd746b-da33-4a1b-87aa-23c1cb8814a9" alt=""><figcaption></figcaption></figure>

But first i actually made a python script that will produce or create a number list ranging from 1 to 100 and it will save to a txt file

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FIoKEMIfPKBlEi7C7Bz3V%2Fimage.png?alt=media&#x26;token=b09349af-9ca6-49c7-aee4-efdac6bfb22f" alt=""><figcaption></figcaption></figure>

```
number = 0 

with open("python1to100.txt","w") as file:
	for i in range(100):
		number = number + 1
		file.write(str(number) + "\n")
		print(number)
```

After we made a umber list we will now use it and insert it to the payload setting in Burp

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F3ZHW16PwDGtZb0GegneM%2Fimage.png?alt=media&#x26;token=e71d76bd-dab7-4035-bb64-2c03f6c2d7f5" alt=""><figcaption></figcaption></figure>

Just start the attack and we can see that here are bunch of 200 http code that we got and one of the GET request actually returns the thm flag and it is located at ticket 83

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FZoVdtiydn9blNOUDdCe7%2Fimage.png?alt=media&#x26;token=6dbdb7a5-6969-4cc6-9331-4fd42c3be49f" alt=""><figcaption></figcaption></figure>

**Task 12: Extra Mile Challenge**

First we have to access the admin login page then just put random character in the username and password box while our burp is intercepting the http traffic

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FSTnUnLdCigF3yCg4A3mF%2Fimage.png?alt=media&#x26;token=a193e403-0552-4f29-a2ae-d7378985a821" alt=""><figcaption></figcaption></figure>

Then we can see here in the burp that we intercepted the POST request from the website.&#x20;

Now we will just forward this to intruder&#x20;

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FuGPJiPXKl3LLqzlTIGWp%2Fimage.png?alt=media&#x26;token=5dc71fb6-f95b-49e0-af4f-eb62df19f35a" alt=""><figcaption></figcaption></figure>

We will pick the "Pitchfork" attack type like the previous challenge then we will add section symbol in the username and password parameters

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FScHkp5BTr9YLn17uVEHI%2Fimage.png?alt=media&#x26;token=d03b9254-77a1-4aaf-bcaa-7f8e6ecd0429" alt=""><figcaption></figcaption></figure>

For the first payload wordlist we will use the username.txt again

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2Fse2CAAYo6NES9jXb7dlM%2Fimage.png?alt=media&#x26;token=ccce6523-d600-4819-ad7e-220de934bc9b" alt=""><figcaption></figcaption></figure>

Then for the second payload set we will use the password.txt again from the zip file that we unzipped earlier

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FRkUCk9MgGiCQZ8083s1k%2Fimage.png?alt=media&#x26;token=bacfd08f-493a-462d-b5e6-6a0a26444807" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FHdlArku9gY4bAsVsnS22%2Fimage.png?alt=media&#x26;token=d9e1f6d9-0998-4b1d-9ec8-8c9e33107a15" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2F1LqWPWSzgbg5RUxKSGwG%2Fimage.png?alt=media&#x26;token=ce58faea-eb3e-4a0b-89a9-52751788ddff" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FJ39BKgGRjKZQbhafpsp3%2Fimage.png?alt=media&#x26;token=2115c3e4-0b58-42ff-a2ce-11f2cc609602" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FGa5hDOZVL5CU8ekW4y5S%2Fimage.png?alt=media&#x26;token=f12e91a4-eb50-4e29-981d-a5734c4c97d0" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FjMxv2xIPmw6OMp1FyZcb%2Fimage.png?alt=media&#x26;token=da37a57b-83f6-4295-b363-16253d2ae192" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FanibITcsZxTXcxV8cOYO%2Fimage.png?alt=media&#x26;token=4ba2a380-6867-491c-bef5-c5e0f5f72717" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3402520177-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F6s691pQpzN41rNo5Bip4%2Fuploads%2FajpuINUBiWtm9qS5LLwA%2Fimage.png?alt=media&#x26;token=f72c45f0-1c9c-4ca9-b88d-07893174dbf3" alt=""><figcaption></figcaption></figure>
