14 January, 2020

In Case of Fire: Break Windows

In Case of Fire: Break Windows
Ochaun Marshall
Author: Ochaun Marshall
Share:

When a client calls us to pentest a web application that is only available in Internet Explorer. I cringe. I don’t know if it’s flashbacks from the countless hours spent getting a website compatible with IE, or the trauma from bad UX growing up. Just mentioning the browser leaves a bad taste in my mouth.

There is a unique problem that occurs when pentesting an IE based web application. You can’t proxy only IE traffic. If you adjust the proxy rules for IE you have to route ALL of your system traffic through Burp. That includes chat clients, other browsers, Office products, background windows processes, and anything else that is reaching out to the internet. Maybe you don’t want your Burp history to fill up with requests to a music streaming site, or maybe you don’t want your boss to know that you’re “multitasking” with an extra Netflix tab. Obviously all of that traffic is out of scope and if you’re familiar with us, you know that we fight tooth and nail against chatty apps.

Our solution here is to throw it all in a VM. This gives us a number of benefits, but being able to dispose of the OS is the key here. We don’t want artifacts from our test lingering on our host machine. In this post we will go over setting up a Windows 10 VM for testing IE exclusive web apps. We’ll walk through setting up the VM, installing the Burp certificate on the Windows guest and proxying the guest traffic through Burp.

VM Setup

First we need a Windows machine. We are going to use an evaluation copy of Windows to avoid the heavy price tag for licensing. 

  1. If you haven’t already download and install VirtualBox
  2. Download the evaluation copy from  https://developer.microsoft.com/en-us/windows/downloads/virtual-machines. Select the VirtualBox version of the OVA
  3. Once downloaded we’ll be changing a couple of settings after opening the file:
  4. 4096 MB of RAM
YCmm1rvY66InRUxtkvjSxnPlu54k0gBSXOswIuZaZV-UOeCYHJRvta41aV1BCbIo8T_TySezJ8WRiVVkmn50hOejNSP0fIH21sdqSLFOOGIrfoSq0aitYv1wkqasYRQZ0BXdgqKD-1
  1. Select Import
  2. Under Settings > Network, Switch the network to bridged adapter
  3. Under Settings > General > Advanced Turn on Bidirectional clipboard sharing and Host to Guest drag ‘n’ drop sharing
Za4LWm-dPSavVGrVLA76wFqRB0jP3NzNDnuR2Nv0XXz1iTAtEPAZboQPbX_2cYfhWbVxTFA6VoUPJ8bIIyT6tw8gN5eA85PGLxu00f4AsWoHgsPjzDBauD6fCAFgbdgKsok_icAb-1
  1. Launch Burp Suite and set up a project for this engagement on your host machine
  2. Go to http://burp with a browser that is configured with burp to download the CA
  3. Boot the guest machine
  4. Click and Drag the cert.der file into your guest machine. 

Installing Burp Certificate 

  1. Find the IP address of the network device that you are using to connect to the internet on your Host machine
    • For Windows pull up ipconfig, and use ifconfig on Unix based systems
  2. In the guest machine use that IP address with :8080 to download the Burp Suite certificate
  3. Open the Local Security Policy by pressing Windows Key (⊞) + R and enter secpol.msc 
  4. Select Public Key Policies > Certificate Path Validation Settings to open a Certificate Path Validation Settings Properties window
S8baxDPs9-VpAXnwPTQ3Ixf51aGwSQpYOBymMYHckO9eIgu7w7cTSD5IhUIQJ6_WXIGwBrzmy2p1R-5T9SShADO4FLAXnYJtSk4yWStY9pXYXAxrrGWG_ewKTt6LVKjTZOToVEfV-1
  1. Select the Stores tab and select the Define these policy settings check box
  2. Select the Allow User Trusted Root CAs to be used to validate certificates and Allow Users to Trust Peer trust certificates options if they’re not already selected.
  3. You should also select the Third-Party Root CAs and Enterprise Root CAs checkbox and press the Apply > OK buttons to confirm the selected settings
  4. (⊞) + R and enter ‘certmgr.msc’
  5. Right Click Trusted Root Certification Authorities to open a context menu
  6. Select All Tasks > Import on the context menu to open the following window
Example 3
  1. Press the Next button, click Browse, and then select the Burp root certificate file saved on your guest machine
  2. Press Next again and place the all certificates in the Trusted Root Certification Authority store
  3. Then you can press Next > Finish to wrap up the import wizard 
  4. A popup window may come up asking if you Trust Portswinger as a Certificate Authority. Click yes to allow it. 
  5. A window will open confirming that “the import was successful”

Proxy Guest Traffic

Now you’re ready to proxy traffic through the host Burp project. 

  1. Open Internet Explorer and go to Tools > Internet Options  > Connections tab
  2. Open LAN settings
  3. Check the Proxy server checkbox and enter the IP address found with ipconfig in the first step of Installing Burp with port 8080

Just a bit of a warning, after a week or two this evaluation VM will expire. When this happens the VM will start shutting down every couple of hours. Once that happens, you’ll have to throw it away and start over. Some of you are thinking, well isn’t this a tedious mind numbing process and I agree. Maybe I can sync up with our resident DevOps guy and get this automated. 

In the meantime, if you’re looking for more guides to hone your skills, we have a number of articles on everything pentesting. Including How to use Burp Suite, Android Pentesting, Game Console Hacking. If you have more general questions on the Penetration testing process, check out our Knowledge Center. Finally if you’re looking to set up a penetration test, training for your organization, or just have general security questions please Contact Us

Join the Professionally Evil newsletter

Related Resources