Skip to main content

Robot Framework Library for the BurpSuite Pro Vulnerability Scanner

Project description

RoboBurp2

Robot Framework Library for BurpSuite Pro

Write all your BurpSuite Pentest Automations in Natural Language Syntax recipes

NOTE: You should NOT be using this in your CI/CD environments, as it will violate the BurpSuite Licensing Policy. Burp only allows CI/CD requirements to leverage Burp's Enterprise Product. You can use this as a pentester on your laptop/testing environment to automate stuff

Please refer to the test (directory) for examples of how you can use this. Video will follow

Installation

  • You need to have a BurpSuite Pro license to use this
  • Install pip install RoboBurp2 to install this and its deps. I recommend pipenv
  • Use this lib to automate scanning, crawling of Burp with its new 2.0 API

Limitations

  • This can scan one app at a time. Haven't provided for multiple scan tasks yet.
  • This library can start Burp, but Burp doesn't seem to provide an API call to shut it down. So it doesn't
  • When Burp starts, you might need to click some prompts to get to an operational mode. I advise that you give it adequate sleep time for this to happen

Keywords

| start burpsuite | <PATH> |

This starts burpsuite from the path in your system. This needs to be the absolute path of the burpsuite_pro.jar file

| initiate crawl and scan against target | auth_logins (dictionary) | config_name(string) |

This is the "Default Scan" where you can crawl and then audit(scan). If you need to do an authenticated crawl, you need to provide a dictionary value to the "auth_logins" argument.

You can also specify the config_name from a list of NamedConfigurations that can be found in your BurpSuite Pro's Top navbar under Burp >> Configuration library

This returns a scan_id that you can use to get status and results later

| initiate scan against target | config_name |

This is pretty much the same as above, except that this should be used when you already have test automation that has "crawled" the app and you only use this mode to "audit". You will need to provide a config_name in this case. Preferably only an Audit config_name, else Burp will try and crawl and audit (default)

This returns a scan_id that you can use to get status and results later

| get burp scan status for id | scan_id |

This fetches the scan status for the particular scan_id that you can use to continuously wait for scan to complete. Once the scan_status shows up as succeeded, this function stops

| get burp scan results for id | scan_id | filename (optional) |

This fetches the scan results for the particular scan_id and writes the results to a JSON file You can provide as an arg, the full path to the file you want to write it to. Else the library writes a file called burp_scan_results.json in the current working directory

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

RoboBurp2-1.2.tar.gz (4.2 kB view details)

Uploaded Source

File details

Details for the file RoboBurp2-1.2.tar.gz.

File metadata

  • Download URL: RoboBurp2-1.2.tar.gz
  • Upload date:
  • Size: 4.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.21.0 setuptools/41.0.1 requests-toolbelt/0.9.1 tqdm/4.31.1 CPython/2.7.10

File hashes

Hashes for RoboBurp2-1.2.tar.gz
Algorithm Hash digest
SHA256 26e43f7c609638061556ac90f29a262326254d114192f16839de16031e458bc3
MD5 4ae6a1bf4687167b7846cec25b03360d
BLAKE2b-256 0dfe95d4dd0cf60ad02637499a4a2fab7af07821549cae589d9587a8fe6f61bf

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page