https://slides.com/xanhacks/burpsuite/
Nov. 2021
whoami - xanhacks
2
3
1. Listening on
127.0.0.1:8080
2. Configure the proxy to 127.0.0.1:8080
3. Add Burpsuite HTTPS certificate, http://burp
4
Intercept and edit (optional) requests or websockets
5
Intercepts only URLs in scope
(request / response)
6
Stop intercepting Websockets
7
Edit, add or remove : headers, body or params
(requests / responses)
8
Site map and scope
9
Add / remove URLs from scope
10
Show only scope items
11
Search string in website
12
Pro version
Automate requests using lists or iterators
(bruteforce, fuzzing)
13
Pro version
= faster
(turbo intruder)
https://portswigger.net/web-security/cross-site-scripting/contexts/lab-html-context-with-most-tags-and-attributes-blocked
14
Battering ram : Same payload value in all positions. It loops through the payload set and replaces all positions with the payload value.
Pitch fork : Uses one payload set for each position. It places the first payload in the first position, the second payload in the second position, and so on.
Cluster bomb : The cluster bomb attack tries all different combinations of payloads. (example : bruteforce with a list of users and passwords.).
15
Edit, replay and observe (manual testing)
16
Rename your tabs (same for Intruder)
17
Auto scroll on change
18
Generate CSRF PoC
19
Pro version
20
Javascript auto-submit
Pro version
Javascript redirection
21
Turn on dark mode
22
Disable interception on startup
23
Exploiting an XSS (Cross-Site-Scripting) vulnerability using the DOM Invader browser extension.
https://portswigger.net/web-security/cross-site-scripting/dom-based/lab-document-write-sink
24
25
26
Any questions ?