Burp Suite
Acts as a proxy and allows you to inspect, modify, replay to web requests.
Proxy
HTTP History tab
Things to Notice:
when a POST method is being used, think of Stored XSS, Cross-site request forgery
When seeing a URL with an email, username, or ID in it, think IDOR.
when seeing a JSON MIME type, think back-end API.
Target
Site map tab
allows one to view requests from a specific target.
useful when hitting an undocumented API endpoint.
clicking on a folder in the sitemap will only show requests from that path.
Intruder
Go to the intruder tab in case want to fuzz or brute force with Burp.
💡Note: Professionals use “Turber Intruder” which hits a whole lot harder and a whole lot faster.
Basic usage
Click the “Clear” button to reset everything
Select the value we are trying to modify and press the “Add” button
Selected the attack type
Click on the “Payloads” tab
Select the payload type and the payload list
Press “Start attack”
Inspect the HTTP responses to determine if there is anything suspicious.
Repeater
Once the request is sent to the Repeater tab:
We can modify the request to test for vulnerabilities and security misconfigurations.
Once the request is modified we can hit the Send button to send the request.
The response will be shown in the Response window.
Last updated