Skip to content

Instantly share code, notes, and snippets.

Embed
What would you like to do?
# -*- coding: utf-8 -*-
"""
Created on Fri Dec 28 14:16:12 2012
@author: Nick Coblentz
Some of this code is borrowed from Brian Holyfield's Burp plugin located here: https://github.com/GDSSecurity/WCF-Binary-SOAP-Plug-In
It is also fully dependent on having NBFS.exe from his plugin in the same directory as Burp.
"""
from burp import IBurpExtender
from burp import IMessageEditorTabFactory
from burp import IMessageEditorTab
from java.io import PrintWriter
from xml.dom import minidom
import subprocess
import base64
from subprocess import CalledProcessError
import sys
class BurpExtender(IBurpExtender, IMessageEditorTabFactory):
def registerExtenderCallbacks(self, callbacks):
self.callbacks=callbacks
self.stdout = PrintWriter(callbacks.getStdout(), True)
self.stderr = PrintWriter(callbacks.getStderr(), True)
self.helpers = callbacks.getHelpers()
callbacks.setExtensionName("WCF Binary Helper")
callbacks.registerMessageEditorTabFactory(self)
return
def createNewInstance(self, controller, editable):
return WCFBinaryHelperTab(self, controller, editable)
class WCFBinaryHelperTab(IMessageEditorTab):
def __init__(self, extender, controller, editable):
self.extender = extender
self.editable = editable
self.controller = controller
self.txtInput = extender.callbacks.createTextEditor()
self.txtInput.setEditable(editable)
self.httpHeaders=None
self.body=None
self.content=None
return
def getTabCaption(self):
return "WCF Binary Helper"
def getUiComponent(self):
return self.txtInput.getComponent()
def isModified(self):
return self.txtInput.isTextModified()
def getSelectedData(self):
return self.txtInput.getSelectedText()
def getHeadersContaining(self, findValue, headers):
if(findValue!=None and headers!=None and len(headers)>0):
return [s for s in headers if findValue in s]
return None
def isEnabled(self, content, isRequest):
#Content-Type: application/msbin1
self.content=content
request_or_response_info=None
if(isRequest):
request_or_response_info=self.extender.helpers.analyzeRequest(content)
else:
request_or_response_info=self.extender.helpers.analyzeResponse(content)
if(request_or_response_info != None):
headers = request_or_response_info.getHeaders()
if(headers!=None and len(headers)>0):
self.httpHeaders=headers
self.body=self.extender.helpers.bytesToString(content[request_or_response_info.getBodyOffset():])
matched_headers = self.getHeadersContaining('Content-Type',headers )
if(matched_headers!=None):
for matched_header in matched_headers:
if('msbin1' in matched_header):
return True
return False
def getPrettyXML(self,xmldata):
try:
return minidom.parseString(xmldata).toprettyxml(encoding="utf-8")
except:
return xmldata
def decodeWCF(self,base64EncodedBody):
try:
#NBFS.exe must be in the same directory as Burp
proc = subprocess.Popen(['NBFS.exe','decode',base64EncodedBody],stdout=subprocess.PIPE,stderr=subprocess.PIPE)
#proc.wait()
output = proc.stdout.read()
self.extender.stdout.println(output)
self.extender.stdout.println(proc.stderr.read())
return output
except CalledProcessError, e:
self.extender.stdout.println("error({0}): {1}".format(e.errno, e.strerror))
except:
self.extender.stdout.println("Unexpected error: %s: %s\n%s" % (sys.exc_info()[0],sys.exc_info()[1],sys.exc_info()[2]))
#self.extender.stdout.println(output)
return None
def encodeWCF(self,xmlContent):
xmlStringContent=self.extender.helpers.bytesToString(xmlContent)
base64EncodedXML=base64.b64encode(xmlStringContent.replace("\n",'').replace("\t",''))
try:
#NBFS.exe must be in the same directory as Burp
proc = subprocess.Popen(['NBFS.exe','encode',base64EncodedXML],stdout=subprocess.PIPE,stderr=subprocess.PIPE)
#proc.wait()
output = proc.stdout.read()
self.extender.stdout.println(output)
self.extender.stdout.println(proc.stderr.read())
return self.extender.helpers.stringToBytes(base64.b64decode(output))
except CalledProcessError, e:
self.extender.stdout.println("error({0}): {1}".format(e.errno, e.strerror))
except:
self.extender.stdout.println("Unexpected error: %s: %s\n%s" % (sys.exc_info()[0],sys.exc_info()[1],sys.exc_info()[2]))
#self.extender.stdout.println(output)
return None
def setMessage(self, content, isRequest):
base64encoded_wcfbinary_data = base64.b64encode(self.body)
self.extender.stdout.println(base64encoded_wcfbinary_data)
output1=self.decodeWCF(base64encoded_wcfbinary_data)
output2=base64.b64decode(output1)
self.txtInput.setText(self.getPrettyXML(output2))
return
def getMessage(self):
if(self.txtInput.isTextModified()):
return self.extender.helpers.buildHttpMessage(self.httpHeaders,self.encodeWCF(self.txtInput.getText()))
else:
return self.content
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.