Getting started with Burp Suite for web application penetration testing.
127.0.0.1:8080| Tool | Purpose | Key Use Case |
|---|---|---|
| Proxy | Intercept & modify HTTP/S traffic | Manipulate requests in real-time |
| Repeater | Resend modified requests | Testing payloads, fine-tuning attacks |
| Intruder | Automated payload delivery | Brute force, fuzzing, parameter enumeration |
| Scanner | Automated vulnerability scanning | Finding common vulns (Pro only) |
| Decoder | Encode/decode data | Base64, URL encoding, hex |
| Comparer | Diff two responses | Spotting differences in auth responses |
| Sequencer | Analyze token randomness | Session token entropy analysis |
1. Enable "Intercept" in Proxy tab
2. Browse target application in configured browser
3. Modify intercepted requests as needed
4. Forward or Drop requests
5. Review all traffic in "HTTP history"
| Type | Description | Example |
|---|---|---|
| Sniper | One payload position at a time | Testing single parameter |
| Battering Ram | Same payload in all positions | Same value in multiple fields |
| Pitchfork | Parallel payloads | Username:password pairs |
| Cluster Bomb | All combinations | Brute force username + password |