Bonjour,
Voici comment installer Burp Suite sur RHEL.
Installer les dépendances :
yum install -y nginx mariadb-server wget unzip
systemctl enable --now nginx mariadb
Configurer MariaDB :
mysql_secure_installation
mysql -u root -p
CREATE DATABASE burp_enterprise CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci;
CREATE USER 'burp_enterprise'@localhost IDENTIFIED BY 'my_password1';
CREATE USER 'burp_agent'@'%' IDENTIFIED BY 'my_password2';
GRANT ALL PRIVILEGES ON burp_enterprise.* TO 'burp_enterprise'@localhost WITH GRANT OPTION;
FLUSH PRIVILEGES;
EXIT
Installer Burp Suite :
unzip burp_enterprise_linux_v*.zip && rm -f burp_enterprise_linux_v*.zip
chmod +x burpsuite_enterprise_linux_v*.sh
./burpsuite_enterprise_linux_v*.sh
Connectez vous pour finir la configuration
https://localhost:8443
Vous pouvez skip cette configuration :
Vous voici à la configuration de la DB :
PostgreSQL:
jdbc:postgresql://localhost:5432/burp_enterprise
Oracle:
jdbc:oracle:thin:@//localhost:1521/<instance-id>
MariaDB / MySQL (except AWS Aurora databases):
jdbc:mysql://localhost:3306/burp_enterprise
MySQL (AWS Aurora databases only):
jdbc:mysql:aurora//localhost:3306/burp_enterprise
Microsoft SQL Server:
jdbc:sqlserver://localhost:1433;databaseName=burp_enterprise
Maintenant la dernière étape création d'un compte admin :
Nginx avec Burp :
nano /etc/nginx/conf.d/burp.conf
server {
listen 80 default_server;
server_name _;
return 301 https://$host$request_uri;
}
server {
listen 443 ssl http2;
server_name burp.my_domain.com;
access_log /var/log/nginx/burp-access.log;
error_log /var/log/nginx/burp-error.log error;
## The default `client_max_body_size` is 1M, this might not be enough for some posters, etc.
client_max_body_size 200M;
# SSL Configuration
ssl_certificate /root/.ssl/burp.my_domain.com.crt;
ssl_certificate_key /root/.ssl/burp.my_domain.com.key;
ssl_session_cache shared:SSL:10m;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384";
ssl_prefer_server_ciphers on;
# See https://hstspreload.org/ before uncommenting the line below.
# add_header Strict-Transport-Security "max-age=15768000; preload;";
add_header X-Content-Type-Options nosniff;
add_header X-XSS-Protection "1; mode=block";
add_header X-Robots-Tag none;
add_header Content-Security-Policy "frame-ancestors 'self'";
add_header X-Frame-Options DENY;
add_header Referrer-Policy same-origin;
location / {
proxy_pass https://localhost:8443;
proxy_set_header Host $host;
proxy_buffering off;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header X-Forwarded-Protocol $scheme;
proxy_set_header X-Forwarded-Host $http_host;
}
}
systemctl restart nginx