🔧 Burp Suite Essentials

Getting started with Burp Suite for web application penetration testing.

Initial Setup

  1. Download Burp Suite from portswigger.net
  2. Configure browser proxy: 127.0.0.1:8080
  3. Install Burp's CA certificate for HTTPS interception
  4. Use FoxyProxy browser extension for quick proxy toggling

Core Tools

ToolPurposeKey Use Case
ProxyIntercept & modify HTTP/S trafficManipulate requests in real-time
RepeaterResend modified requestsTesting payloads, fine-tuning attacks
IntruderAutomated payload deliveryBrute force, fuzzing, parameter enumeration
ScannerAutomated vulnerability scanningFinding common vulns (Pro only)
DecoderEncode/decode dataBase64, URL encoding, hex
ComparerDiff two responsesSpotting differences in auth responses
SequencerAnalyze token randomnessSession token entropy analysis

Proxy Workflow

1. Enable "Intercept" in Proxy tab
2. Browse target application in configured browser
3. Modify intercepted requests as needed
4. Forward or Drop requests
5. Review all traffic in "HTTP history"

Intruder Attack Types

TypeDescriptionExample
SniperOne payload position at a timeTesting single parameter
Battering RamSame payload in all positionsSame value in multiple fields
PitchforkParallel payloadsUsername:password pairs
Cluster BombAll combinationsBrute force username + password

Useful Extensions (BApp Store)

Quick Tips