Burpsuite Pwn
Hello, folks!
I’m a bug hunter, and, well, I was bored. My HackerOne profile was looking kinda sad with no fresh bounties, so I thought, "Why not do some noob research and see what happens?" So here we are. I went down the rabbit hole of Burp Suite extensions and stumbled upon something that could turn Burp into a full-blown attack vector. Buckle up—this one’s gonna be fun.
The Problem: Trusting Extensions Can Be a Terrible Idea
Burp Suite is the Swiss Army knife for security pros, but did you know it could also be a Trojan horse? Yep, Burp lets users install extensions written in Java, Python, or Ruby. While this is great for customization, it also means that extensions execute with the same privileges as the user. That’s hacker talk for this thing can pwn your system if you're not careful.
Here’s what a malicious extension can do:
Open a reverse shell to an attacker-controlled server.
Download and execute malware while you’re sipping coffee.
Steal credentials, screenshots, keystrokes—you name it.
Bypass security controls while looking totally legit.
So yeah, installing random Burp extensions might not be the brightest idea.
My Noob Research: Building a Fake Extension
To prove the point, I threw together a totally innocent Burp extension. On the surface, it just opens Notepad and Calculator—nothing scary, right? But behind the scenes, it’s running malicious code. Check this out:
1. Executing System Commands
import subprocess
subprocess.Popen(["calc.exe"], shell=True) # Opens Calculator
subprocess.Popen(["notepad.exe", "poc.txt"], shell=True) # Opens Notepad with a file
subprocess.Popen(["start", "microsoft.windows.camera:"], shell=True) # Opens CameraSee? Fun little tricks. But now, let’s get serious.
2. Dropping a Malicious PowerShell Script
This script downloads and executes a reverse shell, so now an attacker has full control. Yikes.
3. Setting Up a Backdoor
Now we have a fully functional reverse shell running from Burp. Terrifying? Yep. Avoidable? Also yep.

Why This Matters
Burp Suite extensions are often installed without much thought, but here’s the reality:
They run with your user privileges (Admin? Congrats, you just gave the attacker full control).
They can execute hidden system commands.
They can steal your data without you noticing.
And since many people disable Burp’s extension signing feature (because why not, right?), installing a sketchy extension is like inviting hackers to a buffet.
How to Stay Safe (Because You Should)
1. Don’t Trust Random Extensions
If it’s not from a trusted source, don’t install it.
Review the code before running it.
2. Sandbox and Monitor Extensions
Use a restricted environment to limit what they can do.
Watch for sketchy system calls.
3. Burp Should Enforce Security
Require digital signatures on all extensions.
Log and alert users if an extension tries to run system commands.
The Response: Well, That’s Disappointing
So I reported this to the Burp Suite team, expecting them to say, "OMG, thanks! We’ll fix this ASAP." But instead, I got this:
"Thanks for your report. As noted in our program brief, allowing extensions to execute arbitrary code is a deliberate design decision. BApps have verified signatures, and installing unsigned local extensions is critical for extension development. It's the user's responsibility not to install a malicious extension."
Basically, Burp says it’s not a bug, it’s a feature. And I get it—flexibility is important for pentesters. But honestly? I was a little bit sad. I kinda hoped they’d at least add some sandboxing options or security warnings. But nope, they doubled down.
So yeah, that’s the story of how I tried to hack Burp Suite but instead got hit with "working as intended."
Final Thoughts: Don’t Be a Noob
So yeah, my boredom turned into a fun little experiment, and now I’m even more paranoid than before. If you’re using Burp Suite, be careful what you install—because even the best tools can turn against you if you’re not paying attention.
Have a crazy security story? Let’s chat in the comments!
Stay safe, hack smart.
Last updated