(+91) 704-174-0267
[email protected]
My Account
CyberPedia logo
CyberPedia
  • Home
  • About Us
  • Our Course
    • Skilled Based Courses
      • Advanced Course
      • Beginner Course
      • Master Course
    • Job Guarantee
      • Offensive Security Analyst
      • VAPT Consultant Course
      • Cyber Security Analyst Offense Course
    • Certification Course
      • bug bounty course
  • CyberPedia App
  • Our Partners
  • Our Blog
  • Contact
  • Home
  • About Us
  • Our Course
  • CyberPedia App
  • Our Partners
  • Our Blog
  • Contact

BurpSuite 101 : Introduction to BurpSuite

Posted on August 30, 2024
No Comments

What is Burp Suite ?

  • Burp suite is one of the most popular security testing tool.
  • Burp suite can be used in order to intercept HTTP requests which are going out through web browser.
  • Burp suite falls into the category of proxy servers which means that it sits between the user’s browser and the web server that allows to observe and manipulate all the web traffic that’s being sent back and forward when a particular web application is used.

Why to use Burp suite?

  • To make the app/web more reliable and secure.
  • By using this we can check the vulnerability of any websites or applications.

There are three versions to Burpsuite :

  • Burp Suite Community– Free for everyone’s usage. Has limited features but sufficient for basic Pentesting.
  • Burp Suite Professional– It is a Paid Version and very useful for VAPT (Vulnerability Assessment & Penetration Testing) & Bug Bounty. You can check out all the features here:- https://portswigger.net/burp/pro/features.
  • Burp Suite Enterprise– Unlike the community and professional versions, Burp Enterprise is used for continuous scanning. It provides an automated scanner that can periodically scan web application for vulnerabilities.

Burp Suite Installation

  • Burp Suite comes pre-packaged with Kali Linux, so you should not need to install it there. If, for some reason, Burp is missing from your Kali installation, you can easily install it from the Kali apt repositories.
  • For other Operating Systems (Windows or Mac), you can download installers from the Burp Suite Downloads page.

How to Install Burp Suite in Windows?

  1. Install Burp Suite
  2. After running the installer, select “new temporary project”, followed by “use burp defaults”.

 

3. Click on Start Burp.

 

Now, that we have Burp Suite installed, lets talk about some features of the Community ( Free ) version.

Dashboard :

The first tab that should be open is the Dashboard tab, but keep in mind that you can drag these tabs around so the order of your tabs may not match mine. I recommend putting them in an order that fits your workflow.

 

Target :

The Target tag allows you to view the site map of the target site, as well as what requests you’ve made and what findings you have found for each endpoint.

 

Proxy :

Burp Suite Proxy is a tool that lets you see and change the traffic between your browser and the website you’re testing. You can also use it to test HTTPS websites.

 

Repeater :

Burp Suite Repeater lets us grab a request, change it however we want, and send it again and again. This can be super useful, especially when we have to guess a payload by trying different things (like in SQLi) or when we want to see if an endpoint has any bugs.

 

Intruder :

Burp Suite Intruder is a tool that lets us spam an endpoint with requests. We can use it to bruteforce passwords or to fuzz endpoints. One downside to it is, it is highly rate limited in Burp Suite Community version.

 

Decoder :

Burp Suite Decoder is a tool that helps us change data in different ways. We can use it to decode what we captured, or to encode a payload before we send it to the website. It’s not as popular as the other tools, but it can be very handy.

 

Comparer :

Burp Suite Comparer is a tool that lets us see the difference between two pieces of data. We can compare them by words or by bytes.

 

 

Sequencer :

Burp Suite Sequencer is used when assessing the randomness or entropy of tokens such as session cookie values or other supposedly random generated data. If the algorithm is not generating secure random values, then this could open up some devastating avenues for attack.

 

In our next blog, we’ll delve deeper into the individual components of BurpSuite, exploring their functionalities and how to use them effectively.

We’ll also discuss advanced techniques and best practices for leveraging BurpSuite to conduct thorough security assessments.

Thank you for reading, and as always, happy testing!

Author

  • Rushik Patel
    Rushik Patel

    View all posts
Previous Post
An Overview of IoT Penetration Testing
Next Post
BurpSuite 102: Dashboard Overview

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed

Recent Posts

  • Insecure Deserialization Attacks October 14, 2024
  • HTTP Desync Attacks, Also known as HTTP Request Smuggling September 18, 2024
  • A Nerd’s Guide To Cracking CTF Challenges Part-1 September 17, 2024
  • Burp 107: BurpSuite Decoder, Sequencer and Comparer September 13, 2024
  • Burp 106: BurpSuite Intruder for Application Security Testing September 11, 2024

Categories

  • Cloud (2)
  • CTF (1)
  • Red Team (5)
  • Uncategorized (1)
  • Web (9)
Cyber Security Internship and training

Contacts

[email protected]
+91 91046 20267
215-216, 2nd floor, Pushti Sparsh Acade, BRTS Stop, opposite Rathi Apartment, Dharm Nagar II, Sabarmati, Ahmedabad, Gujarat 380005
Facebook
Instagram
YouTube

Quick Links

  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
  • Refund Policy
  • Cancellation Policy
  • Pricing Policy

Download