🛠Security Tool Cheatsheet
Alex Morgan — Senior Penetration Tester
What is Burp Suite?
Burp Suite is a popular integrated platform for performing security testing of web applications. It provides tools for mapping and analyzing an application’s attack surface, identifying vulnerabilities, and exploiting them effectively.
Installation
Burp Suite can be installed on various operating systems including Windows, macOS, and Linux. You can download it directly from the PortSwigger website. Ensure you have Java Runtime Environment (JRE) installed, as it is required to run Burp Suite.
Basic Syntax
To start Burp Suite, simply use the command:
java -jar burpsuite.jar
Discovery
Using the Target Tab
To map the application:
- Open Burp Suite and navigate to the Target tab.
- Use the Site map to see the structure of the application.
Spidering
To crawl the application:
Right-click on a URL in the Site Map > Crawl
This will enumerate parameters and endpoints. You can further configure the spider settings in the Options tab.
Scanning
Active Scanning
To run an active scan:
Right-click on the URL > Active Scan
This scans for vulnerabilities and provides detailed reports. Ensure your Target Scope is properly defined to avoid scanning unintended targets.
Exploitation
Intruder Tool
For automated attacks, use the Intruder:
Navigate to the Target tab > Intruder > Positions
Markers for injection points can be set. You can customize payloads based on the context, like brute-forcing or injection attacks.
Analysis
Repeater Tool
For manual testing, use Repeater:
Right-click on a request > Send to Repeater
This allows you to manipulate and resend requests to observe the server’s response.
Evasion
Using Proxy
To intercept requests:
Set your browser to use the Burp proxy on 127.0.0.1:8080
Ensure you install the Burp CA certificate in your browser for HTTPS traffic.
Reporting
To generate reports:
Dashboard > Report > Generate Report
You can customize the report format and content based on the findings from your testing.
Quick Reference Table
| Flag | Description |
|---|---|
| -c | Enable crawler |
| -a | Activate the scanner |
| -i | Perform Intruder tasks |
Pro Tips
- Use the Scanner in passive mode during active engagements to avoid detection.
- Customize payloads in the Intruder for more targeted attacks (e.g., SQLi, XSS).
- Leverage the Extensions feature in Burp to add new capabilities (e.g., for specific vulnerabilities).
Real-World Examples
Example of command injection using Intruder:
1. Send a POST request to the target with a parameter.
2. Use Intruder to modify the parameter value with common payloads.
3. Analyze the responses to determine if a command injection is possible.