Getting familiar with BurpSuite

Getting familiar with BurpSuite

The tools offered by BurpSuite are:

1. Spider:

It is a web spider/crawler that is used to map the target web application. The objective of the mapping is to get a list of endpoints so that their functionality can be observed and potential vulnerabilities can be found. Spidering is done for a simple reason that the more endpoints you gather during your recon process, the more attack surfaces you possess during your actual testing.

2. Proxy:

BurpSuite contains an intercepting proxy that lets the user see and modify the contents of requests and responses while they are in transit. It also lets the user send the request/response under monitoring to another relevant tool in BurpSuite, removing the burden of copy-paste. The proxy server can be adjusted to run on a specific loop-back ip and a port. The proxy can also be configured to filter out specific types of request-response pairs.

3. Intruder:

It is a fuzzer. This is used to run a set of values through an input point. The values are run and the output is observed for success/failure and content length. Usually, an anomaly results in a change in response code or content length of the response. BurpSuite allows brute-force, dictionary file and single values for its payload position. The intruder is used for:

  • Brute-force attacks on password forms, pin forms, and other such forms.
  • The dictionary attack on password forms, fields that are suspected of being vulnerable to XSS or SQL injection.
  • Testing and attacking rate limiting on the web-app.

4. Repeater:

Repeater lets a user send requests repeatedly with manual modifications. It is used for:

  • Verifying whether the user-supplied values are being verified.
  • If user-supplied values are being verified, how well is it being done?
  • What values is the server expecting in an input parameter/request header?
  • How does the server handle unexpected values?
  • Is input sanitation being applied by the server?
  • How well the server sanitizes the user-supplied inputs?
  • What is the sanitation style being used by the server?
  • Among all the cookies present, which one is the actual session cookie.
  • How is CSRF protection being implemented and if there is a way to bypass it?
  • 5. Sequencer: The sequencer is an entropy checker that checks for the randomness of tokens generated by the webserver. These tokens are generally used for authentication in sensitive operations: cookies and anti-CSRF tokens are examples of such tokens. Ideally, these tokens must be generated in a fully random manner so that the probability of appearance of each possible character at a position is distributed uniformly. This should be achieved both bit-wise and character-wise. An entropy analyzer tests this hypothesis for being true. It works like this: initially, it is assumed that the tokens are random. Then the tokens are tested on certain parameters for certain characteristics. A term significance level is defined as a minimum value of probability that the token will exhibit for a characteristic, such that if the token has a characteristics probability below significance level, the hypothesis that the token is random will be rejected. This tool can be used to find out the weak tokens and enumerate their construction.
  • 6. Decoder: Decoder lists the common encoding methods like URL, HTML, Base64, Hex, etc. This tool comes handy when looking for chunks of data in values of parameters or headers. It is also used for payload construction for various vulnerability classes. It is used to uncover primary cases of IDOR and session hijacking.
  • 7. Extender: BurpSuite supports external components to be integrated into the tools suite to enhance its capabilities. These external components are called BApps. These work just like browser extensions. These can be viewed, modified, installed, uninstalled in the Extender window. Some of them are supported on the community version, but some require the paid professional version.
  • 8. Scanner: The scanner is not available in the community edition. It scans the website automatically for many common vulnerabilities and lists them with information on confidence over each finding and their complexity of exploitation. It is updated regularly to include new and less known vulnerabilities.

要查看或添加评论,请登录

Anand Vijayan的更多文章

  • HTTP - Status Codes

    HTTP - Status Codes

    The Status-Code element in a server response, is a 3-digit integer where the first digit of the Status-Code defines the…

  • Content Sniffing

    Content Sniffing

    ?? Content sniffing Content sniffing, also known as MIME sniffing or media type sniffing, is a process used by web…

  • HTTP - Security

    HTTP - Security

    HTTP is used for communications over the internet, so application developers, information providers, and users should…

  • IronWASP

    IronWASP

    ronWASP (Iron Web Application Advanced Security testing Platform) is an open source tool used for web application…

  • Browser Exploitation Framework

    Browser Exploitation Framework

    beef-xss BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web…

  • Burp Suite

    Burp Suite

    Burp Suite is a software security application used for penetration testing of web applications. Both a free and a paid…

    1 条评论
  • Nessus

    Nessus

    Nessus is a popular vulnerability assessment tool used to identify vulnerabilities, misconfigurations, and other…

  • DrozScan

    DrozScan

    DrozScan is a tool designed for security professionals and penetration testers. It is primarily used for scanning web…

  • HYDRA

    HYDRA

    Hydra is a powerful and popular password-cracking tool that is included in Kali Linux, a distribution widely used for…

  • Sillenttrinity

    Sillenttrinity

    SilentTrinity is a post-exploitation tool used for persistence, reconnaissance, and lateral movement in Windows…

    1 条评论

社区洞察

其他会员也浏览了