Skip to content

Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.

License

Notifications You must be signed in to change notification settings

0xC01DF00D/Collabfiltrator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Collabfiltrator

Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.

Version: 4.0

Authors:

AI Authors:

  • Claude 3.5 Sonnet
  • ChatGPT 4o

Requirements:

  • Burp Suite Professional 2024.11.2 or Later

Support:

Building from Source

Installation in Burp Suite Professional

Original Blog Post

Supported RCE Targets:

  • Windows (Powershell)
  • Linux (sh + ping)
  • Linux (sh + nslookup)
  • Linux (bash + ping)
  • Linux (bash + nslookup)

Supported SQLi Targets:

  • Microsoft SQL Server (Stacked Queries)
  • MySQL (Windows)
  • PostgreSQL (Elevated Privileges)
  • Oracle (Elevated Privileges)
  • Oracle (XML External Entities)

RCE Exfiltration Usage:

Select a platform from the dropdown menu, enter the desired command, and press Execute. A payload will be generated for the platform you choose. Select Copy Payload to Clipboard, run the generated payload on your target, and wait for results to appear in the output window.

SQLi Exfiltration Usage:

Select a DBMS from the dropdown menu, select an extraction query from the dropdown menu, choose between hex encoding the output before DNS exfiltration (to preserve special characters, spaces, etc) or performing the exfiltration in plaintext, and press Dump. A payload will be generated for the DBMS you choose. Select Copy Payload to Clipboard, run the generated payload on your target, and wait for results to appear in the output window. Exfiltrated table and column data will populate in subsequent column and row payloads.

If you liked this plugin, please consider donating:

BTC: 1GvMN6AAQ9WgGZpAX4SFVTi2xU7LgCXAh2
ETH: 0x847487DBcC6eC9b681a736BE763aca3cB8Debe49
Paypal: paypal.me/logueadam

Change Log:

4.0:

  • Complete rewrite in native Java using Portswigger's Montoya API.
  • Faster than the Legacy Jython Version.
  • Introducing SQLi DNS exfiltration with payload support for Microsoft SQL Server (Stacked Queries), MySQL (Windows), PostgreSQL (Elevated Privileges), Oracle (Elevated Privileges), and Oracle (XXE).
  • New info icon includes a mouseover modal that explains constraints of each payload.
  • Exfiltrated SQLi table and column data automatically populates in subsequent column and row payloads.
  • SQL injection payloads can be modified in the payload box before copying them to the clipboard.

3.0:

  • This version was originally going to contain the SQLi DNS exfiltration functionality. However, it was never released because I decided halfway through the implementation to just rewrite the entire thing in native Java using Portswigger's Montoya API.

2.2:

  • Fixed Burp 2024 issues with output not displaying.

2.1:

  • Replaced the Linux exfil method with the enhanced Linux ping exfil command from mr-mosi's fork. This payload been modified to work on systems running busybox and old sh shells.
  • Added Dark Mode Compatibility.
  • Fixed IDN 2008 error when hosts don't support punycode domains by setting "="" from "-"" to "EQLS".
  • Added Burp 2021 GUI Compatibility so it doesn't look terrible.
  • Added command output history to Extender tab.

2.0:

  • Fixed dangling threads when unloading extension.
  • Fixed dangling threads when execute button is pressed multiple times.
  • Added "Stop Listener" button to manually stop listener instead of waiting for timeout.
  • Removed 60 second timeout.
  • Added printing of command executed to output box for better tracking.
  • Added "Clear Output" Button for output box.
  • Removed "E-F" suffix from subdomain string during exfiltration

1.0:

  • Initial Release.

About

Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages