Burp Suite Community Edition: Complete Guide

Burp Suite Community Edition Interface
Introduction to Burp Suite
Burp Suite Community Edition is a leading web security testing tool used by security professionals worldwide. This comprehensive guide will walk you through its essential features and how to use them effectively for web application testing.
Prerequisites:
- Java Runtime Environment (JRE) installed
- Basic understanding of HTTP/HTTPS protocols
- Basic knowledge of web technologies
Installation and Setup
Getting Started
- Visit PortSwigger's download page
- Download the appropriate version for your operating system
- Run the installer and follow the installation wizard
- Launch Burp Suite Community Edition
Configuring Burp Proxy
Proxy Configuration Steps
- Navigate to Proxy > Options
- Default proxy listener runs on 127.0.0.1:8080
- Install Burp's CA certificate in your browser:
- Visit http://burp
- Download the CA certificate
- Import into browser's certificate store
- Configure browser to use Burp's proxy:
- Set HTTP/HTTPS proxy to 127.0.0.1:8080
- Use browser extensions like FoxyProxy for easy switching
Key Features and Tools
1. Proxy Tool
Intercepting Traffic
- Enable/disable interception using the "Intercept" button
- View and modify requests/responses in real-time
- Forward, drop, or modify intercepted traffic
- Use filters to focus on specific traffic:
Host: example.com Method: POST URL: /api/.*
2. Target Tool
Site Mapping
- View site map of all discovered content
- Set target scope to focus testing
- Analyze attack surface
- Filter and organize targets
3. Repeater Tool
Request Manipulation
- Modify and resend requests
- Test different parameters and payloads
- Compare responses
- Useful keyboard shortcuts:
Ctrl+R: Send request Ctrl+U: URL encode Ctrl+Shift+U: URL decode
4. Intruder Tool
Automated Testing
Four attack types:
- Sniper: Tests one payload set against single position
- Battering Ram: Uses same payload in multiple positions
- Pitchfork: Uses multiple payload sets simultaneously
- Cluster Bomb: Tests all combinations of payload sets
Note: Community Edition has rate-limited Intruder tool
5. Decoder Tool
Encoding/Decoding
- URL encoding/decoding
- Base64 encoding/decoding
- HTML encoding/decoding
- ASCII hex encoding/decoding
- Multiple encoding layers support
Best Practices and Tips
Optimization Tips
- Use scope settings to reduce noise:
- Define target scope
- Filter proxy history
- Configure target scope settings
- Save important requests to repeater
- Use project files to save work
- Configure display filters effectively
- Master keyboard shortcuts for efficiency
Common Testing Tasks
Security Testing Workflows
- Authentication Testing:
- Capture login requests
- Test session handling
- Check password reset functionality
- Authorization Testing:
- Test access controls
- Check role-based permissions
- Verify API endpoints
- Input Validation:
- Test for XSS vulnerabilities
- Check SQL injection points
- Verify file upload security