Burp Suite is a powerful web testing tool with a wide range of features
Phạm Ngọc Sơn (PNS), senior QA of Safewhere team, had a quick introduction about using Burp Suite on Linux to do penetration testing
Burp Suite is a powerful web testing tool with a wide range of features. One of its most useful feature is the ability to act as an intercepting proxy server which in turn allows us to intercept web traffic and modify a web request before it goes to the remote web server, and modify a response before it comes to browser.
You can use Burp Suite to view and modify:
- Form data and hidden fields of requests/responses.
- AJAX requests.
- Headers including cookies sent from/to a browser.
Burp Suite on kali Linux
In this post, I will introduce how to use Burp Suite on Kali Linux. First, fire up Burp Suite, and browse to Proxy –> Options:
As you can see, the proxy server is running on 127.0.0.1 port 8080 where I need to route all traffic of my browser through it. In Iceweasel on Kali Linux, this is found in Edit –> Preferences –> Network –> Settings:
After setting the proxy, Burp will show an alert that it captured a request whenever a request is made:
Now let’s move to a functional example in which I modified a request:
After making a request to a site, I changed the __RequestVerificationToken parameter for checking CSRF attack and clicked on the Forward button to submit the modified request. The result from the web application meant it is doing CSRF check correctly:
Intercepting the response is easy too:
–Pham Ngoc Son-
Notice: Trying to access array offset on value of type bool in /home/ritvncom/public_html/wp-content/themes/flatsome/inc/shortcodes/share_follow.php on line 41