Burpsuite

Burpsuite is a Man in the middle (MITM) web application proxy. At a base level, Burp can be used to intercept and modify traffic sent by a web browser. Burpsuite can also be used for:

  • Bypass client side input validation.

  • Capture and log all HTTP requests made by the browser.

  • Passively build a sitemap as you walk the application.

  • Modify and replay previous requests.

  • Decode/encode text

  • Add/remove/modify Headers and parameters.

  • Change request method

  • Automate a sequence of requests (think authentication)

  • Manage cookies and user sessions.

  • Perform a plethora of web based attacks.

  • Prevent out of scope requests (this can and will save your ass at some point)

  • [PRO] Automatic Vulnerability scanner and validation

  • [PRO] Automatically spider website and build site map (similar to gobuster or dirb)

  • [PRO] Session persistence and saved projects.

The professional version has some automagic features, but this is still a very manual tool. You will still need to know how to find and exploit common vulnerabilities to take full advantage of this tool.

Download, install, and setup

Burpsuite Community (the version that doesn't cost half a grand) can be downloaded for free at https://portswigger.net/burp/releases/community/latest

Download the latest version for your platform, Java is required to run this software.

Once you are done installing, run the application and select

Temporary Project > Next > Use Burp Defaults > Start Burp

Unless you have the professional version, you can just press next until your up and running.

Learning Resources

There are a metric fuck-ton of resources and training videos you can take advantage of to learn how to use this tool.

Try Hack Me

Interactive capture the flag style hand on learning.

Portswigger

More traditional lectures and included CTF style lab activities.

Proxy

The Burpsuite proxy can be used to intercept and modify incoming requests. The burp proxy can be configured to proxy traffic from any browser that supports proxies, but for simplicity we will use the included chromium based browser.

Navigate to the Proxy tab, and click Open Browser. All traffic into and out of this browser will be captured by Burp.

Modifying requests

To modify requests, Press the gray intercept is off button. The text should change to say intercept is on with a blue background. Next, navigate to example.com. You should then see the following request queued in burpsuite:

In the main view, we can modify the request my editing the text. We are also greeted with an inspector navigation bar on the right. We can use this to modify the request in a tabled format. Selecting an existing parameter or header will give us the option change how the information is displayed. For example, we are given the option to base64 or url decode parameters.

From here we have a few options for interacting with the request: Forward, Drop, and Action.

  • Forward: Sends the request to the server

  • Drop: Drops the request

  • Action: opens the right click context menu

Last updated