zzw1994414

Newbie
Joined
30.03.25
Messages
22
Reaction score
0
Points
1
View attachment 8294🛠️ Tampering Antifraud Requests using Burp Suite 🛠️

Lots of people have been requesting me for some time now some more guides on how to use Burp. So I figured Id finally cave and drop some knowledge on one of the most powerful tools in your digital arsenal.

Burp is a versatile tool with hundreds of nifty features that can be used beyond just assessing sites - you can check vulnerabilities find hidden endpoints, manipulate web traffic and fuck with those pesky antifraud systems blocking your cards. When you know what you're doing, the possibilities are extensive.



Intercepting Requests

See when you browse any website, theres a constant back-and-forth conversation happening. Your browser (the frontend) sends requests to the website's servers (the backend) which processes them and sends back responses. Its a digital conversation where your browser requests to view products or make purchases, and the server responds accordingly.

Burp Suite plants itself right in the middle of this conversation as a proxy. It's digital eavesdropping – you see every request leaving your browser and every response coming back. More importantly you can pause this conversation, edit whats being transmitted and then let it continue. The server has no fucking clue you just rewrote the script.


This matters because when shopping online your browser isn't just talking to the main website. Its also sending data to hidden antifraud systems like Stripe Radar or Forter that analyze whether you're legitimate or some bot-using scammer. With Burp, you can intercept and manipulate both types of traffic – the main site requests and the sneaky antifraud callbacks happening behind the scenes.

Bypassing CVV Requirement via Intercept

One common application of Burp especially among autistic Binners, is forcing sites to accept cards without CVV. Binners generate cards in bulk and test them using public checkers but most sites require CVV, which is why Burp became such a valuable tool.

Heres the dirty little secret: When you submit payment info at checkout your browser sends a POST request containing all your card details – number, expiry CVV, the works. Using Burp's Intercept feature you can catch this request before it reaches the server and edit that shit however you want.

lH0LEBp.png

The trick is to either remove the CVV field entirely:
Code:
{"card_number":"4111111111111111","expiry":"12/25""billing_zip":"10001"}

Or replace it with an empty value:
Code:
{"card_number":"4111111111111111","expiry":"12/25""cvv":"","billing_zip":"10001"}

If the merchants backend validation is garbage (and you'd be amazed how many major retailers fuck this up) the payment might still process. Some payment gateways configure CVV as "optional" rather than required, and lazy developers often dont enforce proper validation. Heck, I've seen shops before where you can even tamper and change the prices of the items you are checking out.

Other major retailers have similar vulnerabilities that Binners exploit to use their generated cards without any CVVs.

Altering Antifraud Request

Now that you understand the basics of interception let's step it up. We all know modern antifraud systems are sneaky motherfuckers. They inject JavaScript code into the pages you browse, silently collecting mountains of data about you. These scripts track everything from your device configuration to how you move your mouse.

Heres what these scripts typically gather:
  • Browser fingerprints (user agent screen resolution, installed fonts)
  • Hardware details (GPU info via WebGL rendering CPU cores)
  • Mouse movements and click patterns (speed, jitter natural vs. bot-like paths)
  • Typing rhythm (how fast you enter data, pauses between keystrokes)
  • Whether you're using a headless browser or automation tools (Selenium etc.)


All this data gets packaged and sent to their servers (like m.stripe.com for Stripe or forter.com endpoints) where AI systems decide if youre legit or sketchy.

These systems know their data can be tampered with, so they try to hide it from prying eyes. They'll:
  • Base64 encode their payloads
  • Use character swapping (like replacing a' with x' and vice versa)
  • Obfuscate their JavaScript code
  • Split data across multiple requests
  • Use custom encoding schemes
But heres the dirty truth: security through obscurity is about as effective as that 414720 you bought for $1. These systems must send data in a format your browser can process which means it's there for the taking if you know where to look.

Practical Example: Riskified in Booking.com

Lets get our hands dirty with Riskified, one of the more notorious fraud prevention systems that's been cockblocking carders left and right. Unlike some half-assed security measures this one actually has some teeth to it.

First, we need to set up interception rules in Burp Suite:
  1. Go to Proxy > Options > Intercept Client Requests
  2. Add a rule: AND domain name matches c.riskified.com
  3. Disable response interception
UBbyfPX.png

Now browse around the site and pick a flight and try getting to the checkout page and it will most likely connect first to:

mp84qwV.png


After connecting here, it downloads the JS needed to fingerprint your system. This isnt casual data collection – it's a full digital cavity search that attempts to send everything about you to:

c.riskified.com

Since weve set up interception the fingerprint won't be sent to Riskifieds servers. If you check the HTTP logs panel, you'll see it trying to send an obfuscated payload containing your digital DNA:

nOXNHNL.png

Deobfuscation

Anti-fraud sites obfuscate your fingerprint because if they didnt tampering would be child's play. Its like hiding your house key – sure, it's still there but at least make the thief work for it.

代码反混淆需要技巧,但并非难事。你只需要逆向工程 JavaScript 如何生成有效载荷即可。如果你智商低于 70,那就直接咨询人工智能吧。如果你自作聪明地认为 Riskified 只是使用了 Base64 编码(虽然很多 Riskified 都用了 Base64),那就错了:

avqVKui.png

但你们也了解我,我爱你们所有人,所以为了这次演示,我开发了一个工具来帮助破解常用反检测解决方案中的指纹。本次演示中,我启用了Riskified,但很快我会添加对大多数反欺诈提供商的支持。


为了方便起见,请前往 BinX 中的反欺诈反混淆工具,选择Riskified,然后粘贴我们截获的有效载荷。

ADbPFPq.png

解密后,您的指纹数据就像一本打开的书一样清晰可见。
[代码]
{
纬度:37.7749,
“时区”:240,
"timestamp": "1689452187394",
"cart_id": "7629384105",
"shop_id": "cf.bstatic.com",
"referrer": "https://secure.booking.com/",
"href": "https://cf.bstatic.com/static/tag_c...a077563c1795a773c91150dd19adefe98d13fd65.html",
“riskified_cookie”:“p8jkl352qxnrtyuvcbm7fds9ghzwe6”,
"color_depth": 24,
"page_id": "9xzp4r",
“shop”: “www.booking.com”
"hardware_concurrency": 8,
"has_touch": true,
"history_length": 7,
"document_title": "Booking.com",
"console_error": "console.memory 未定义",
"battery_error": "获取电池时出错",
"initial_cookie_state_0": "https",
"initial_cookie_state_1": "持久化",
"浏览器": {
"productsub": "20030107",
"is_opr": true,
"is_firefox": false,
"ev_len": 42
},
"os": {
"cpu": "Windows NT 10.0",
“平台”: “Win32”
},
"webgl": {
“供应商”: “谷歌公司”,
"渲染器": "ANGLE (Intel, Intel(R) UHD Graphics 620, OpenGL 4.5)"
},
“解决”: {
“dpr”:1.5,
"screenh": 1080,
“screenw”:1920,
"availh": 1040,
"availw": 1920,
“innerh”:900,
“innerw”:1600,
“outerh”:1040,
“outerw”:1920
},
"date_string": "2025年3月25日星期五 14:23:07 GMT-0400 (美国东部夏令时)",
"intl": {
"locale": "en-GB",
"num_sys": "latn",
“cal”:“gregory”,
"tz": "America/New_York"
},
"downlink_error": "navigator.connection 未定义",
"nav_plu": "Chrome PDF 插件、Chrome PDF 查看器、原生客户端",
"nav_lang": "en-GB",
"page_language_data": {
"page_language": "en",
"has_translation": true
},
"隐身": {
"safari": true,
"chrome_quota": 120,
"service_worker_undefined": false,
"is_brave": true
}
}
[/代码]



然后,您可以进行策略性修改,以提高信任度并使其与您的目标用户画像相符:

隐藏文本:无法引用。


修改完成后,将修改后的数据重新混淆,替换拦截控制面板中的有效载荷,然后转发请求。

IQqqtYh.png

这个过程会将你伪造的指纹与你的cookie关联起来。系统会把你当成普通的合法顾客,而不是你真正的身份——一个网络骗子。

结论

使用Burp Suite操纵反欺诈系统就像拥有了一套数字伪装工具包。你不仅可以改变自己的外貌,还能改变监控摄像头捕捉到的内容。通过将Burp置于浏览器和这些系统之间,你可以向它们提供任何你想要的“指纹”,甚至无需使用任何反检测功能。

成功与否取决于你是否真正理解这些系统收集哪些数据以及如何解读这些数据。在修改Burp日志之前,请先分析反欺诈请求,找出其中的规律。你越了解系统检查的内容,就能越精准地进行操作。

记住:有效的数字欺骗不在于隐形,而在于看起来如此正常,以至于他们根本不会多看一眼。

请记住,我们仅仅触及了Burp Suite功能的冰山一角。这款功能强大的工具拥有数十个模块和数百项功能,我甚至还没有提及——从自动扫描到查找 SQL 注入漏洞,再到模糊测试端点。它是一款复杂的工具,值得投入时间去精通。我将在以后的指南中介绍更多高级技巧。

回头见。d0ctrine 告退。
c
 
Top Bottom