Post 10: Burp Suite for Web Pentesters

The Swiss Army Proxy for Recon, Exploitation, and Mastery

Burp Suite is the most powerful tool in a web pentester’s arsenal. Whether you’re performing recon, brute-forcing, exploiting injection points, or breaking session management — Burp is where it all happens.

This post is your complete guide to mastering Burp Suite from the ground up, including manual testing, automated fuzzing, and practical usage for OSCP/eCPPT and beyond.

  1. What is Burp Suite?
  2. Setting It Up
  3. Proxy Module
  4. Target & Scope
  5. Repeater
  6. Intruder
  7. Decoder
  8. Comparer
  9. Logger
  10. Extensions (BApp Store)
  11. Workflow: From Recon to Exploitation
  12. Tips, Shortcuts, and Gotchas
  13. Practice Targets

Burp Suite is a man-in-the-middle proxy designed for web application security testing. It intercepts, modifies, and analyzes HTTP and HTTPS traffic between your browser and the target web server.

  • Community – Free, feature-limited (Intruder is slower, no automation)
  • Professional – Paid, unlocks full power: Active Scanner, faster Intruder, search, project saves
  • Enterprise – For automated enterprise scanning (not relevant to pentesters)

Set your browser to use Burp as a proxy:

127.0.0.1:8080

Use Firefox with the FoxyProxy extension for easy switching.

  • Visit http://burpsuite
  • Download the CA certificate
  • Import into your browser as a trusted CA

This allows Burp to intercept HTTPS without SSL errors.

The Proxy tab lets you:

  • Intercept and modify live HTTP requests/responses
  • View raw HTTP/HTTPS traffic
  • Control exactly what gets intercepted
  • Intercept login requests to find parameters
  • Modify cookies, headers, body data
  • Drop or forward requests

Use the “Intercept is On” button to toggle real-time interception.

  • Shows site map of all pages, parameters, and file types encountered
  • Automatically updates as you browse

Define your target:

  • Only test domains/IPs you specify
  • Prevent sending data to unintended apps

Example:

Include in scope: http://target.com

Use Filter > Show only in scope items during testing to reduce clutter.

The Repeater tab is essential for manual exploitation.

You can:

  • Resend modified requests
  • Inject payloads
  • Analyze changes in response
  • Test SQLi, XSS, command injection
  • Modify cookies and tokens
  • Replay requests with slight changes
  • Observe response headers and HTML

Shortcut:

  • Right-click → “Send to Repeater”

Intruder is Burp’s automated fuzzing engine.

You can:

  • Brute-force login forms
  • Enumerate hidden directories
  • Fuzz parameters
  • Test for rate limiting, WAF evasion
  1. Set the target request
  2. Define payload positions using § markers
  3. Load payloads from a wordlist (e.g., rockyou.txt)
  4. Configure attack type:
    • Sniper – One input at a time
    • Battering Ram – Same payload for all positions
    • Pitchfork – Parallel payloads
    • Cluster Bomb – All combinations

Intruder shows status codes, response lengths, and response times to help you identify hits.

Used to:

  • Encode and decode base64, URL, HTML, hex, etc.
  • Analyze obfuscated input/output

Example:

ZGF0YV9sZWFrZWRfdXNlcm5hbWU= → base64 decode → data_leaked_username

You can also hash strings (MD5, SHA1) and guess input formats.

Great for spotting subtle differences in responses.

Use it to:

  • Compare two server responses (before/after payload)
  • Detect error-based injection indicators
  • Analyze token changes or minor behavior changes

Workflow:

  • Right-click → Send to Comparer
  • Byte or word-level diff

Burp’s HTTP history is gold:

  • View all requests/responses
  • Filter by method, status code, content-type
  • Replay anything with a double-click

Use it to track all traffic, discover endpoints, and identify app behavior under different inputs.

Burp Suite Pro allows extensions from the BApp Store.

ExtensionPurpose
AutorizeDetects IDOR and auth bypasses
Active Scan++Enhances built-in scanner
Turbo IntruderBlazing-fast bruteforcer
JWT EditorDecode, edit, sign JWT tokens
HackvertorConverts and encodes payloads
Logger++Advanced logging and filtering
Param MinerFinds hidden and undocumented params
  • Enable Proxy and browse app manually
  • Set Target Scope
  • Use Site Map to find interesting parameters
  • Run passive scans if using Burp Pro
  • Use Repeater to test:
    • SQLi, XSS, LFI, command injection
    • Cookie and header manipulation
  • Use Decoder to inspect responses
  • Send login or search to Intruder
  • Load wordlists and analyze results
  • Highlight anomalies by comparing length/status
  • Inject payloads in Repeater
  • Chain with other vulnerabilities
  • Use Comparer to monitor behavior differences
ShortcutAction
Ctrl + Shift + HHTTP history
Ctrl + IToggle interception
Ctrl + RSend to Repeater
Ctrl + JSend to Intruder

Gotchas:

  • Don’t forget to set scope to avoid testing irrelevant domains
  • Use Filters to reduce noise
  • Always save your project before closing
  • Community Edition’s Intruder is rate-limited — use Repeater for manual brute-force if needed
  • PortSwigger Web Security Academy – Burp labs built by the tool’s creators
  • TryHackMe – Burp Fundamentals, Burp Labs, Web Exploitation rooms
  • HackTheBox – Most boxes require Burp for web apps
  • DVWA, bWAPP, WebGoat – Great for local testing
  • Capture and manipulate login requests
  • Fuzz parameters and headers for vulnerabilities
  • Modify tokens and cookies to bypass auth
  • Replay and tamper with requests for injection testing
  • Analyze the entire app’s attack surface

Post 11: Common Web Exploits in OSCP/eCPPT Exams
We’ll review:

  • The most likely vulnerabilities to appear
  • What tools to use
  • How to chain them into full compromise

L

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top