Extension for Burp Suite which uses AWS API Gateway to change your IP on every request.
More info: Bypassing IP Based Blocking Using AWS - Rhino Security Labs
This extension allows you to easily spin up API Gateways across multiple regions. All the Burp Suite traffic for the targeted host is then routed through the API Gateway endpoints which causes the IP to be different on each request. (There is a chance for recycling of IPs but this is pretty low and the more regions you use the less of a chance).
This is useful to bypass different kinds of IP blocking like bruteforce protection that blocks based on IP, API rate limiting based on IP or WAF blocking based on IP etc.
A version of this is available in the BApp store which you can install from there directly: https://portswigger.net/bappstore/2eb2b1cb1cf34cc79cda36f0f9019874
If you want to check on the resources and enpoints that were started or any potential errors you can look at the output console in Burp.
Use helper script for creating API GW in your AWS account. It requires boto3
but it does not need to be setup for Burp, and you need to have valid AWS profile setup:
Usage: createapigws.py [OPTIONS]
Options:
--profile TEXT AWS profile to use [default: pentest1]
--state-file TEXT API GW state directory, script creates STATE_FILE and
STATE_FILE.json. [default: api_gateways.txt]
--create TEXT specify target URL: https://example.com
--delete
--help Show this message and exit.
createapigws.py
to API GW File.createapigws.py
script.Make sure you have Jython installed and add IPRotate.py through the Burp Extension options.
After releasing this extension it was pointed out that there has been other research in this area using AWS API Gateway to hide an IP address. There is some awesome research and tools by @ustayready @ryHanson and @rmikehodges using this technique.
Be sure to check them out too: