Extension that looking for PII data in passive requests.
- Download Jython standalone JAR, for example version 2.7.3
- Go to Extensions->Extensions settings. Set path inside
Location of Jython standalone JAR file
in Python enviroment.
- Unzip the burp extension PII-SCAN.zip
- Go to Extensions->Installed. Click Add. Set
Extension type
toPython
. Setburp_pii_scan.py
insideExtension file
and press Next button.
Install extension. Browse sites through Burp proxy. If the extension found PII data it will create a log in console, create a issue with the data leaked and how to remediate.