Burpsuite tricks
Know your tools, gain in productivity

https://slides.com/xanhacks/burpsuite/
Nov. 2021
whoami - xanhacks
2



Summary
- What is Burpsuite ?
-
Tabs :
- Proxy
- Target
- Intruder (demo)
- Repeater
- Project / User options
- Extension : DOM Invader (demo)
- Secret question
3
1) What is Burpsuite
- Tool for web pentesting
- Acts as a proxy between your browser and the web server
- Edit and replay HTTP requests on the fly
- (Pro version) Vulnerability scanner
- ...



1. Listening on
127.0.0.1:8080
2. Configure the proxy to 127.0.0.1:8080
3. Add Burpsuite HTTPS certificate, http://burp
4
2.1) Tab : Proxy (ctrl+shift+p)

Intercept and edit (optional) requests or websockets
5
2.1) Tab : Proxy (Options)

Intercepts only URLs in scope
(request / response)
6
2.1) Tab : Proxy (Options)
Stop intercepting Websockets

7
2.1) Tab : Proxy (Options)
Edit, add or remove : headers, body or params
(requests / responses)

8
2.2) Tab : Target (ctrl+shift+t)
Site map and scope

9
2.2) Tab : Target (ctrl+shift+t)
Add / remove URLs from scope
10

2.2) Tab : Target (ctrl+shift+t)
Show only scope items
11

2.2) Tab : Target (ctrl+shift+t)
Search string in website
12

Pro version
2.3) Tab : Intruder (ctrl+shift+i)
Automate requests using lists or iterators
(bruteforce, fuzzing)

13
Pro version
= faster
(turbo intruder)
2) Tab : Intruder (ctrl+shift+i)
https://portswigger.net/web-security/cross-site-scripting/contexts/lab-html-context-with-most-tags-and-attributes-blocked
Demo :
- Iterates through lists
- Match text in responses
- Payload processing (suffix and prefix)
- Payload encoding (URL encoding)
14
2) Tab : Intruder (ctrl+shift+i)
Attack types
- Sniper : Replaces only one position at a time. After its done with the first position, it continues with the second position.
-
Battering ram : Same payload value in all positions. It loops through the payload set and replaces all positions with the payload value.
-
Pitch fork : Uses one payload set for each position. It places the first payload in the first position, the second payload in the second position, and so on.
-
Cluster bomb : The cluster bomb attack tries all different combinations of payloads. (example : bruteforce with a list of users and passwords.).
15
2.4) Tab : Repeater (ctrl+shift+r)
Edit, replay and observe (manual testing)

16
2.4) Tab : Repeater (ctrl+shift+r)
Rename your tabs (same for Intruder)
17

2) Tab : Repeater (ctrl+shift+r)
Auto scroll on change

18
2) Tab : Repeater (ctrl+shift+r)
Generate CSRF PoC
19

Pro version
2) Tab : Repeater (ctrl+shift+r)
20

Javascript auto-submit
Pro version
2.5) Tab : Project (options)
Javascript redirection

21
2) Tab : User (options)
Turn on dark mode

22
2) Tab : User (options)
Disable interception on startup

23
Exploiting an XSS (Cross-Site-Scripting) vulnerability using the DOM Invader browser extension.

https://portswigger.net/web-security/cross-site-scripting/dom-based/lab-document-write-sink
3) DOM Invader (demo)
24
4) Secret question
25

26
End
Any questions ?

Burpsuite tricks
By xanhacks
Burpsuite tricks
- 829