FPD Scanner is a Burp Suite extension that passively scans HTTP responses for full path disclosure (FPD) vulnerabilities. It highlights paths that could expose sensitive information about a server's file structure, such as file paths in Windows and Unix/Linux environments.
- Identifies full path disclosure vulnerabilities in HTTP responses.
- Detects Windows-style and Unix/Linux-style file paths.
- Excludes false positives caused by JavaScript Unicode encoding sequences.
- Supports passive scanning to ensure no active interference with the target server.
To use the FPD Scanner, follow these steps:
- Open Burp Suite.
- Go to the
Extender
tab. - Click
Add
and selectPython
as the extension type. - Select the
FPDScanner.py
file and clickNext
to load the extension.
The extension will now run in the background, scanning all HTTP responses for full path disclosure vulnerabilities.
Once the extension is loaded:
- Perform regular HTTP/HTTPS traffic interception using Burp Suite.
- The extension will passively scan all HTTP responses for file paths that might expose sensitive information (e.g.,
C:\Users\TestUser\Documents\secret.txt
or/etc/passwd
). - Detected vulnerabilities will be reported in the Issues tab.
- You can also force a passive scan by right-clicking on the selected target in the sitemap tree and clicking Passively scan this host.
- Jython 2.7.2 or higher is required to run this Python extension.