Out-of-Band (OOB) Fuzzing with Burp Suite

Sandeep WawdaneSandeep Wawdane
2 min read

Introduction

While many security testers are familiar with fuzzing techniques, the use of Out-of-Band (OOB) payloads is often overlooked. OOB fuzzing can reveal hidden vulnerabilities that are not directly observable through immediate application responses. OOB is a method to detect various types of vulnerabilities, such as command injection, SQL injection, Server-Side Template Injection (SSTI), XML External Entity (XXE) attacks, and others. These are identified through external interactions rather than immediate application responses. This article will guide you through setting up and using OOB payloads in Burp Suite to identify potential security issues effectively, using the vulnerable lab.

Step 1: Configure the Intruder Tab

  1. Target Selection: Clone and set up the vulnerable-website-down-checker repository on your local machine.

  2. Intruder Positioning: Open Burp Suite and go to the Intruder tab. Select the positions you want to fuzz by highlighting the parameters, which in this case, is the domain parameter.

    Step 2: Setting OOB Payloads

    1. From the payload type, select "Simple List." Next, select "Payload Settings" and choose "Fuzzing Out of Band."

    2. In "Payload Processing," select the last option, "Replace Placeholder with Collaborator Payload."

      Step 3: Start the Attack

      Start the attack and observe the interactions. You will see where the payload was interacted with. 1 indicates where interaction happened, 0 means no interaction.

      Step 4: Manually Crafting Payload

      1. Based on the identified interaction, manually craft the payload. For example, in this case, I found an OOB command injection, so I am using the following payload crafted from the initial identification. In different cases, the payload would vary, such as for SQL injection, ssti etc.

        Observe the Collaborator's Response:
        Monitor the Collaborator service for incoming DNS requests.

        The response indicates that the payload executed successfully, and the command logname returned root as the current user's username.

        This confirms that the payload was executed and the command injection vulnerability is present.

        Conclusion

        This guide focused on utilizing fuzzing and identification techniques using Burp Suite and OOB payloads. While we covered how to set up and detect vulnerabilities, detailed exploitation was not the primary goal here. For more in-depth information on manual exploitation, refer to the Out-of-Band Exploitation (OOB) Cheatsheet. By leveraging OOB fuzzing with Burp Suite, security testers can uncover a wide range of hidden vulnerabilities, enhancing the overall security posture of the applications tested.

        Thorfinn Einar GIF

        Thank you for reading this guide. I hope it helps you enhance your security testing techniques. Happy hacking!

1
Subscribe to my newsletter

Read articles from Sandeep Wawdane directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Sandeep Wawdane
Sandeep Wawdane

Passionate penetration tester with a keen eye for vulnerabilities, dedicated to enhancing cybersecurity through collaboration and innovation.