Turbo Intruder: Abusing HTTP Misfeatures to Accelerate Attacks by James Kettle

  Рет қаралды 22,405

Bugcrowd

Bugcrowd

Күн бұрын

Recorded live on January 19, 2019 at LevelUp 0x03.
Learn more: www.bugcrowd.com/resources/ev...
Join Bugcrowd: bit.ly/invitesplz
Have a question related to this talk? Post it on our forum: forum.bugcrowd.com/t/levelup-...
Abstract:
"Automated web application attacks are terminally limited by the number of HTTP requests they can send. It's impossible to know how many hacks have gone off the rails because you didn't quite manage to bruteforce a password, missed a race condition, or failed to find a crucial folder.
In this session I'll introduce, demo and distribute Turbo Intruder - a research grade Burp extension built from scratch with speed in mind. Most tools struggle to reach 1,000 HTTPS requests per second (RPS), whereas Turbo Intruder uses a selection of custom HTTP stacks to exceed 30,000 RPS while minimising the chance of your router exploding. It's also designed to be fully extensible so you can easily launch multi-step attacks and filter responses.
As well as showing how to use the tool, I'll discuss the underlying HTTP abuse that enables it to go so fast, so you can attain similar speeds in any tools you happen to write. Finally, I'll cover some new research I'm currently pursuing on generating context-aware payloads and automatically identifying interesting responses."
Follow us on Twitter: / bugcrowd

Пікірлер: 29
@danieljordan1793
@danieljordan1793 5 жыл бұрын
This guy is awesome, his content is always original and extremely helpful!
@waliedahmed5030
@waliedahmed5030 Жыл бұрын
Agree!
@sakettestsakettest8009
@sakettestsakettest8009 4 жыл бұрын
This guy is incredible ❤️
@saeedkamranfar684
@saeedkamranfar684 4 жыл бұрын
GREATE, James kettel is the legend of web security
@mthulisi8840
@mthulisi8840 3 жыл бұрын
Excellent stuff!
@killzann7757
@killzann7757 3 жыл бұрын
This is incredible, thanks
@DeepakPrajapati-ny3bj
@DeepakPrajapati-ny3bj 5 жыл бұрын
Thank you for this very informative and very helpful video.
@CU.SpaceCowboy
@CU.SpaceCowboy 3 жыл бұрын
i saw a video of him getting a shell on a code sandbox website with like 2-3 broken up lines of php. hes legendary.
@SatouSei13
@SatouSei13 Жыл бұрын
Amazing tool. Thank you! 🙏🙏
@Ramazan05duldug
@Ramazan05duldug 4 жыл бұрын
Thanks! )
@rnz2363
@rnz2363 3 жыл бұрын
i did not have a clue about HTTP pipelining. good info here. thx
@freem4nn129
@freem4nn129 11 ай бұрын
nice !! thx for this
@zoomanimation420
@zoomanimation420 4 жыл бұрын
Thanks
@TheHackTodayOfficial
@TheHackTodayOfficial 5 жыл бұрын
cool!
@a.for.arun_
@a.for.arun_ 2 жыл бұрын
@albinowax Legend!!!
@yoshi5113
@yoshi5113 Жыл бұрын
I love James Kettle ..
@skylinegeekhackerone8560
@skylinegeekhackerone8560 4 жыл бұрын
i get error, SyntaxError: ("mismatched input 'table' expecting INDENT", ('', 26.0, 'table.add(req) ')) when i user race.py to check race condition
@DragonStoneCreations
@DragonStoneCreations 3 жыл бұрын
How to configure multiple injection points in the request? I tried using %s in 2 locations, payload is injected only first %s :(
@poxato
@poxato 3 жыл бұрын
there's a premade script in the scripts section of the turbo intruder for multiple Parameters.
@slaxblake
@slaxblake 4 жыл бұрын
How to use it for race condition @Bugcrowd
@jessicaito5212
@jessicaito5212 Жыл бұрын
What am I doing wrong. I am only getting 100-141 RPS. Do I need to get anything other then Turbo Intruder? My settings are concurrentConnections=25 requestsPerConnection=100 Pipeline=True
@shayberkovich8104
@shayberkovich8104 4 жыл бұрын
Still don't understand why James hasn't incorporated this into Intruder functionality - that would add multiple insertion points, wordlists and other Intruder features for free. Instead, he decided to implement this as a separate extension.
@tombautista2913
@tombautista2913 4 жыл бұрын
I am trying to tweak setting just like you've guided but not able to achieve those thousands and thousands of RPS.
@tombautista2913
@tombautista2913 4 жыл бұрын
I can provide you with more details but I don't have my own website I was just trying it on random websites on internet which is illegal know that.
@tibabalaseo2046
@tibabalaseo2046 2 жыл бұрын
@@tombautista2913 Maybe those websites just blocked you off IP? But it's been 2 years so i'm sure you know that
@SplinterAI
@SplinterAI 2 жыл бұрын
You are the man !! Can you download turbo intruder for free?
@slayeeerrr
@slayeeerrr 2 жыл бұрын
It is integrated with Burp Suite as a plugin, and it is available even on Community Edition! :-)
@SplinterAI
@SplinterAI 2 жыл бұрын
Is there any chance that you would consider helping me Find my first bug bounty ! Im stuck Im stuck . Great video thou .
@bigdatax6512
@bigdatax6512 2 жыл бұрын
hey there i want to ask something ..how can i contact you
LevelUp 0x04 - OWASP Amass - Discovering Internet Exposure
58:28
LevelUp 0x04 - How to Use Zap + using Zap HUD in your browser
58:32
Неприятная Встреча На Мосту - Полярная звезда #shorts
00:59
Полярная звезда - Kuzey Yıldızı
Рет қаралды 7 МЛН
Smart Sigma Kid #funny #sigma #comedy
00:25
CRAZY GREAPA
Рет қаралды 15 МЛН
DO YOU HAVE FRIENDS LIKE THIS?
00:17
dednahype
Рет қаралды 74 МЛН
Alat Seru Penolong untuk Mimpi Indah Bayi!
00:31
Let's GLOW! Indonesian
Рет қаралды 15 МЛН
HTTP Desync Attacks: Smashing Into The Cell Next Door - James Kettle
44:41
Bugcrowd University - Advanced Burp Suite
45:13
Bugcrowd
Рет қаралды 24 М.
The Tragedy of systemd
47:18
linux.conf.au
Рет қаралды 1,1 МЛН
Finding Bugs with Burp Plugins & Bug Bounty 101
47:48
Bugcrowd
Рет қаралды 39 М.
Turbo Intruder Burp Extension : How to use Turbo Intruder?
10:28
Hacker Associate
Рет қаралды 12 М.
API Security 101 by Sadako
20:58
Bugcrowd
Рет қаралды 51 М.
LevelUp 0x02 - Bug Bounty Hunter Methodology v3
1:22:05
Bugcrowd
Рет қаралды 143 М.
Main filter..
0:15
CikoYt
Рет қаралды 15 МЛН
В России ускорили интернет в 1000 раз
0:18
Короче, новости
Рет қаралды 1,8 МЛН
YOTAPHONE 2 - СПУСТЯ 10 ЛЕТ
15:13
ЗЕ МАККЕРС
Рет қаралды 175 М.
Урна с айфонами!
0:30
По ту сторону Гугла
Рет қаралды 8 МЛН