
Try and resist the urge to start analyzing things in Burp Suite right a way.

During the initial walkthrough of your target application it is important to manually click through as much of the site as possible. From the “Intercept” sub-tab ensure that the toggle button reads “Intercept is off”Īpplication Walkthrough – Burp Suite Tutorialįor some reason, a lot of people like to skip this step. Next turn intercept off as it is not needed for the initial application walkthrough. Uncheck the Burp Suite defaults and check “URL Is in target scope”. The second and third headings display the configurable options for intercepting requests and responses. Navigate to the “Proxy” tab under the “Options” sub-tab. Set it to only pause on requests and responses to and from the target site. The next thing I do is configure the proxy intercept feature. Here is what my configuration settings look like for Burp Suite.Ĭonfigure Intercept Behavior – Burp Suite Tutorial This allows me to easily switch back-and-forth between various proxy configurations that I might need during different engagements. I also prefer to use a proxy switching addon such as “ SwitchySharp” for Google Chrome.
#Burp suite scanner pdf password
This ensures I don’t accidentally pass any personal data to one of my client’s sites such as the password to my gmail account for example. #ProTip I use a separate browser for web application testing. Navigate to and ensure your IP address is coming from your testing environment. Configure your browser’s proxy settings to use Burp Suite. Now Burp Suite is configured to route traffic through your outbound SSH tunnel. Type in localhost for the host option and 9292 for the port option. From the “Connections” sub-tab, Scroll down to the third section labeled “ SOCKS Proxy”. Navigate to the Options tab located near the far right of the top menu in Burp Suite. SSH out to your testing server and setup a SOCKS Proxy on your localhost via the ‘–D’ option like this. I prefer to use a simple SSH connection which works nicely for this purpose. This ensures that testing traffic originates from your approved testing environment. Configure Outbound SOCKS Proxy – Burp Suite Tutorialĭepending on the scope of your engagement, it may be necessary to tunnel your Burp Suite traffic through an outbound SOCKS Proxy.

This will be the first in a two-part article series.ĭisclaimer: Testing web applications that you do not have written authorization to test is illegal and punishable by law. After reading this, you should be able to perform a thorough web penetration test.
#Burp suite scanner pdf how to
I will demonstrate how to properly configure and utilize many of Burp Suite’s features. The following is a step-by-step Burp Suite Tutorial. Burp Suite from Portswigger is one of my favorite tools to use when performing a Web Penetration Test.
