Skip to content

Commit 335220e

Browse files
committed
formatting
1 parent cde34ae commit 335220e

4 files changed

Lines changed: 30 additions & 21 deletions

File tree

docs/How to Use BurpSuite with Faction.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ You can install the Faction Integration directly from the BApp store.
1515
1. Open Burp then Click Extensions->BApp Store
1616
3. Search for Faction
1717
4. Click Install
18+
1819
![](/files/Pasted%20image%2020240619150257.png)
1920

2021
## Set Up Faction
@@ -29,24 +30,29 @@ You can retrieve your API Key in Faction by accessing your profile in the upper
2930

3031
## Access Your Assessment Queue
3132
Now that Faction is configured you should be able to see you current assessment queue as shown below:
33+
3234
![](/files/Pasted%20image%2020240619151342.png)
3335

3436
Clicking on an assessment will show you the scope, any vulnerabilities that have been reported, and notes that your team has shared with you.
37+
3538
![](/files/Pasted%20image%2020240619151525.png)
3639

3740
If you select one of the vulnerabilities you can see its full details including screenshots.
41+
3842
![](/files/Pasted%20image%2020240619151631.png)
3943

4044
## Enter Findings into Faction From Burp
4145

4246
Lets say you find an XSS attack and have verified it with BurpSuite. You can add the finding to Faction without ever leaving Burp. Just select the request or response that you want to enter into the report and select "Add New Finding" as shown below:
47+
4348
![](/files/Pasted%20image%2020240619152503.png)
4449

4550
Now you will be presented with the vulnerability findings dialog. Here you can search for an existing vulnerability template to auto populate the details and recommendations.
4651

47-
Next ensure its being sent to the right assessment. The option will default to the last assessment you selected in the previous section on [Access your Assessment Queue](#Access%20Your%20Assessment%20Queue)
52+
Next ensure its being sent to the right assessment. The option will default to the last assessment you selected in the previous section on [Access your Assessment Queue](#access-your-assessment-queue)
4853

4954
Next you have several options.
55+
5056
- Select the severity or leave the default
5157
- Check or uncheck to include the request and/or response. When checked it will include these options in code blocks in the final report.
5258
- "Snip cookies" when checked will remove all cookies from being added to the report and replace them with `[...snip...]`
@@ -75,6 +81,7 @@ Anything found in the BurpSuite Scanner can be added directly into Faction using
7581
![](/files/Pasted%20image%2020240619154354.png)
7682

7783
Below shows that all issues were combined into two distinct issues.
84+
7885
![](/files/Pasted%20image%2020240619154637.png)
7986

8087
Notice that if you select more than one of the same issue that it will aggregate the URLs into one finding:

site/How to Use BurpSuite with Faction/index.html

Lines changed: 21 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1014,32 +1014,34 @@ <h2 id="install-the-burp-faction-integration">Install the Burp Faction Integrati
10141014
<p>You can install the Faction Integration directly from the BApp store.
10151015
1. Open Burp then Click Extensions-&gt;BApp Store
10161016
3. Search for Faction
1017-
4. Click Install
1018-
<img alt="" src="/files/Pasted%20image%2020240619150257.png" /></p>
1017+
4. Click Install</p>
1018+
<p><img alt="" src="/files/Pasted%20image%2020240619150257.png" /></p>
10191019
<h2 id="set-up-faction">Set Up Faction</h2>
10201020
<p>In BurpSuite navigate to the Faction tab after you have installed the Faction Integration. From here you need to enter the URL and API key for your user. </p>
10211021
<p>The URL will be your domain plus <code>api</code>. Ex <code>https://faction-test.factionsecurity.com/api</code></p>
10221022
<p><img alt="" src="/files/Pasted%20image%2020240619150830.png" /></p>
10231023
<p>You can retrieve your API Key in Faction by accessing your profile in the upper right corner of the Faction Web Interface.
10241024
<img alt="" src="/files/Pasted%20image%2020240619151123.png" /></p>
10251025
<h2 id="access-your-assessment-queue">Access Your Assessment Queue</h2>
1026-
<p>Now that Faction is configured you should be able to see you current assessment queue as shown below:
1027-
<img alt="" src="/files/Pasted%20image%2020240619151342.png" /></p>
1028-
<p>Clicking on an assessment will show you the scope, any vulnerabilities that have been reported, and notes that your team has shared with you.
1029-
<img alt="" src="/files/Pasted%20image%2020240619151525.png" /></p>
1030-
<p>If you select one of the vulnerabilities you can see its full details including screenshots.
1031-
<img alt="" src="/files/Pasted%20image%2020240619151631.png" /></p>
1026+
<p>Now that Faction is configured you should be able to see you current assessment queue as shown below:</p>
1027+
<p><img alt="" src="/files/Pasted%20image%2020240619151342.png" /></p>
1028+
<p>Clicking on an assessment will show you the scope, any vulnerabilities that have been reported, and notes that your team has shared with you. </p>
1029+
<p><img alt="" src="/files/Pasted%20image%2020240619151525.png" /></p>
1030+
<p>If you select one of the vulnerabilities you can see its full details including screenshots.</p>
1031+
<p><img alt="" src="/files/Pasted%20image%2020240619151631.png" /></p>
10321032
<h2 id="enter-findings-into-faction-from-burp">Enter Findings into Faction From Burp</h2>
1033-
<p>Lets say you find an XSS attack and have verified it with BurpSuite. You can add the finding to Faction without ever leaving Burp. Just select the request or response that you want to enter into the report and select "Add New Finding" as shown below:
1034-
<img alt="" src="/files/Pasted%20image%2020240619152503.png" /></p>
1033+
<p>Lets say you find an XSS attack and have verified it with BurpSuite. You can add the finding to Faction without ever leaving Burp. Just select the request or response that you want to enter into the report and select "Add New Finding" as shown below:</p>
1034+
<p><img alt="" src="/files/Pasted%20image%2020240619152503.png" /></p>
10351035
<p>Now you will be presented with the vulnerability findings dialog. Here you can search for an existing vulnerability template to auto populate the details and recommendations. </p>
1036-
<p>Next ensure its being sent to the right assessment. The option will default to the last assessment you selected in the previous section on <a href="#Access%20Your%20Assessment%20Queue">Access your Assessment Queue</a></p>
1037-
<p>Next you have several options.
1038-
- Select the severity or leave the default
1039-
- Check or uncheck to include the request and/or response. When checked it will include these options in code blocks in the final report.
1040-
- "Snip cookies" when checked will remove all cookies from being added to the report and replace them with <code>[...snip...]</code>
1041-
- "Extract Selection" when checked will only add the portion of the code you selected in Burp to the report. This is most useful trying to only show the reflected script in the response instead of the full response.
1042-
- Exploit Steps can be included and supports MarkDown Syntax. <em>Note Screenshots are available though the Burp Extension currently. For this you still need to add them to the Web UI.</em> </p>
1036+
<p>Next ensure its being sent to the right assessment. The option will default to the last assessment you selected in the previous section on <a href="#access-your-assessment-queue">Access your Assessment Queue</a></p>
1037+
<p>Next you have several options. </p>
1038+
<ul>
1039+
<li>Select the severity or leave the default</li>
1040+
<li>Check or uncheck to include the request and/or response. When checked it will include these options in code blocks in the final report.</li>
1041+
<li>"Snip cookies" when checked will remove all cookies from being added to the report and replace them with <code>[...snip...]</code></li>
1042+
<li>"Extract Selection" when checked will only add the portion of the code you selected in Burp to the report. This is most useful trying to only show the reflected script in the response instead of the full response. </li>
1043+
<li>Exploit Steps can be included and supports MarkDown Syntax. <em>Note Screenshots are available though the Burp Extension currently. For this you still need to add them to the Web UI.</em> </li>
1044+
</ul>
10431045
<p><img alt="" src="/files/Pasted%20image%2020240619152829.png" /></p>
10441046
<p>Now you can click <strong>Save</strong> to add it to Faction. All this allows issues to be added seamlessly without breaking your flow. The final result will look something like this.</p>
10451047
<p><img alt="" src="/files/Pasted%20image%2020240619153743.png" /></p>
@@ -1051,8 +1053,8 @@ <h2 id="replay-findings">Replay Findings</h2>
10511053
<h2 id="add-scan-findings">Add Scan Findings</h2>
10521054
<p>Anything found in the BurpSuite Scanner can be added directly into Faction using the BurpSuite Integration as well. Just select the issues you want to add and then choose "Send Issues to Faction"</p>
10531055
<p><img alt="" src="/files/Pasted%20image%2020240619154354.png" /></p>
1054-
<p>Below shows that all issues were combined into two distinct issues.
1055-
<img alt="" src="/files/Pasted%20image%2020240619154637.png" /></p>
1056+
<p>Below shows that all issues were combined into two distinct issues.</p>
1057+
<p><img alt="" src="/files/Pasted%20image%2020240619154637.png" /></p>
10561058
<p>Notice that if you select more than one of the same issue that it will aggregate the URLs into one finding:</p>
10571059
<p><img alt="" src="/files/Pasted%20image%2020240619154521.png" /></p>
10581060
<h2 id="wrapping-up">Wrapping Up</h2>

site/search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

site/sitemap.xml.gz

0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)