FPD Scanner is a Burp Suite extension that passively scans HTTP responses for full path disclosure (FPD) vulnerabilities. It highlights paths that could expose sensitive information about a server's file structure, such as file paths in Windows and Unix/Linux environments.
- Identifies full path disclosure vulnerabilities in HTTP responses.
- Detects Windows-style and Unix/Linux-style file paths.
- Excludes false positives caused by JavaScript Unicode encoding sequences.
- Supports passive scanning to ensure no active interference with the target server.
To use the FPD Scanner, follow these steps:
- Open Burp Suite.
- Go to the
Extendertab. - Click
Addand selectPythonas the extension type. - Select the
FPDScanner.pyfile and clickNextto load the extension.
The extension will now run in the background, scanning all HTTP responses for full path disclosure vulnerabilities.
Once the extension is loaded:
- Perform regular HTTP/HTTPS traffic interception using Burp Suite.
- The extension will passively scan all HTTP responses for file paths that might expose sensitive information (e.g.,
C:\Users\TestUser\Documents\secret.txtor/etc/passwd). - Detected vulnerabilities will be reported in the Issues tab.
- You can also force a passive scan by right-clicking on the selected target in the sitemap tree and clicking Passively scan this host.
- Jython 2.7.2 or higher is required to run this Python extension.