Burp Suite vs CSRF Tokens: CSRFTEI

I wrote a very simple burp extension that can pull a token a CSRF token out of a response and update the next request with that token. It’s designed to be a simple as possible so it works for my lesson on writing burp extensions and if you’re lucky then all you need to do is update the script with the name of the token your target application uses and you’re good to go but it’s designed to be as easy to tweak to your needs as possible. I also wrote about how to install custom extensions here if you’ve not done that before, just copy and paste the below code into a file called csrftei.py and load that file into burp! The code is all available below and should be nicely commented to explain how everything works:

print "Loading CSRFTEI (Sea-Surf-Tea)"
print "Cross-site Request Forgery Token Extractor and Inserter"
print "Remember to update token details in the extension!n"
# You need to import the interfaces you want to use here there's a list in the
# API documentation! https://portswigger.net/burp/extender/api/
# In this module, I'm just messing with requests so only need the basics:
from burp import IBurpExtender
from burp import IHttpListener
# Regex are used for capturing the token value from the response
import re
# In the site I originally wrote this plugin for the token was in a JSON message
# in the strange form name='csrft' value='*', you should change the below so that
# it's appropriate for your target application, taking note of if ' or " are used
# and changing 'csrft' to the name of the token used in your application, e.g.
# RequestVerificationToken, antiCSRF, CSRFtoken, etc.
 csrfregex = re.compile(r"name='csrft's+value='(.*?)'")
 class BurpExtender(IBurpExtender, IHttpListener):
    # Variable to hold the token found so that it can be inserted in the next request
    discoveredToken = ''
     def registerExtenderCallbacks(self, callbacks):
         self._callbacks = callbacks
         self._helpers = callbacks.getHelpers()
         print "Extension registered successfully."
     def processHttpMessage(self, toolFlag, messageIsRequest, currentMessage):
        # Operate on all tools other than the proxy
        if toolFlag != self._callbacks.TOOL_PROXY:
            if messageIsRequest:
    def processResponse(self, currentMessage):
        response = currentMessage.getResponse()
        parsedResponse = self._helpers.analyzeResponse(response)
         respBody = self._helpers.bytesToString(response[parsedResponse.getBodyOffset():])
        token = csrfregex.search(respBody)
        if token is None:
            print "No token found in response.n"
            BurpExtender.discoveredToken = token.group(1)
            print "Found a token."
    def processRequest(self, currentMessage):
        request = currentMessage.getRequest()
        parsedRequest = self._helpers.analyzeRequest(request)
        requestBody = self._helpers.bytesToString(request[parsedRequest.getBodyOffset():])
        if BurpExtender.discoveredToken != '':
            # Here we're using the token name as the start point and an ampersand as the end point
            # so your token must be in the request like csrft=xxxxxx& if there's no trailing amp then
            # this won't work!
            updatedBody = re.sub(r'csrft=.*?&', 'csrft={0}&'.format(BurpExtender.discoveredToken), requestBody)
            print "Replaced the token."
            # No token to replace, so leave the body as it is
            updatedBody = requestBody
            print "No token to replace."
        updatedRequest = self._helpers.buildHttpMessage(parsedRequest.getHeaders(), updatedBody)