Burpsuite software introduction
Burpsuite is a powerful penetration testing tool from the past. It is an integrated platform for attacking web applications. It contains many tools, such as Proxy, Spider, Scanner, Intruder, Repeater, Sequencer, Decoder, Comparer and other tool modules, and has designed many interfaces for these tools to facilitate acceleration. The process of attacking an application. All tools share a powerful and extensible framework that can handle and display HTTP messages, persistence, authentication, proxies, logging, and alerts. By intercepting HTTP/HTTPS web data packets, it acts as a middleman between browsers and related applications, intercepting, modifying, and replaying data packets for testing. It is very suitable for information security practitioners.
Burp Suite is an integrated penetration testing tool that is essential for information security practitioners. It adopts automatic testing and semi-automatic testing, and includes Proxy, Spider, Scanner, Intruder, Repeater, Sequencer, Decoder, Comparer and other tool modules. By intercepting HTTP/HTTPS web data packets, acting as a middleman between browsers and related applications, intercepting, modifying, and replaying data packets for testing, it is a necessary Swiss Army knife for web security personnel.
Burpsuite software features
Burp Suite provides excellent analysis functions. You can find tools to analyze errors in the software.
If your software encounters an error, you need to analyze the cause of the error
If there is a vulnerability in your website program, you need to analyze the vulnerability in the software
Use this Burp Suite software to analyze your vulnerabilities
Display the cause of the error in the software, allowing users to find vulnerabilities in the current web
Supports more tools to help you scan the web and analyze all problems immediately
Burpsuite software features
1. Burp Suite is a professional vulnerability analysis software that can detect vulnerabilities in your website.
2. Suitable for maintenance personnel to safely maintain your computer system
3. Supports repeated scanning function to re-detect the current system content
4. Supports more extended content, and nearly ten tools to maintain your system
5. Supports manual selection of analysis content, and can add analysis modules
6. Supports common vulnerability analysis and can detect more than 100 vulnerabilities
7. Burp Suite Enterprise Edition can perform scheduled scans at specific times or perform one-time scans on demand.
8. Repeat scans can be configured to run indefinitely or until a defined endpoint.
9. View the entire scan history of a given website in one location.
Burpsuite installation steps
1. Download Burpsuite in Huajun Software Park, then unzip it, click to open the registration machine: burp-loader-keygen.jar, then click run, fill in the license text as you like, then copy and paste the generated license into the opened burp, click next
2. Then we click manual activation
3. Then we paste the request into the activation request, the response will be automatically generated, and then paste it into the bottom response in burp, click Next
4. Burpsuite is downloaded successfully, so we can use it.
Burpsuite usage tutorial
Introduction to Burp module
- Target
Target, as the first module of Burp, functions as a site map. All web pages that pass through the proxy server will appear on the left side and will be displayed here.
When https://www.csdn.net/ is accessed, the "Target" function module has crawled all access records and displayed them on the left, as shown in the figure.
Of course, if you want to use Burp for testing, you must first modify the proxy of the local browser.
The following uses Firefox as an example to explain the basic configuration of Burp.
First, you need to find the proxy settings in Firefox settings and set it to the same IP as the Burp software.
What needs to be noted is that the port number needs to be consistent with the port number set above, both are 8080
Proxy
In Burp, the "Proxy" module is a crucial module, and its layout is like this.
The role of the intercept module in the Proxy module is to intercept request traffic between HTTP/HTTPS. If the third button "intercept is off", here is the awareness that interception is not turned on. If it is turned on, it will change to "intercept is on"
Now we intercept the HTTPS traffic of the CSDN login page.
After I entered my account password, I clicked to turn on interception, and the status changed to "intercept is on". At this time, the traffic requested through this HTTPS will be intercepted and not sent, and will be displayed under your "intercept" module, as shown in the figure shown.
all both all all all all being all
&username=rNma0y&password=147258369&rememberMe=true<=LT-1269028-Xs5rYscId3GAlIBVB6NgisRx6zJCo5&execution=e2s1&_eventId=submit
When interception is turned on, the entire web page cannot be requested because all requests sent have been intercepted. If you want to access the next web page, select the first button "Forward" in the module. This button means release. , causing him to send this data packet through the request.
Drop
Drop means discarding the package and re-capturing the data.
Action
The functions of Action are as follows. It can send requests to various modules for interaction.
HTTP history
The function of this module is to intercept the history of packets, and keep the history of previously intercepted data packets here.
Scan
The Scan function module is used for scanning. It is a web application scanner and is unique to the Pro version. The Community version does not have this function.
The method of use is to right-click the menu after capturing the packet, and "Do a active scan" will appear. After clicking, it will be sent to the Scan module of Burp. The most important indication will be highlighted in yellow.
Intruder
The Intruder module is the most useful part of the entire Burp tool. It is often used in brute force cracking. You can implement automated attacks by adding a dictionary.
You can operate HTTP requests under Position under the Intruder module. You can set a separate parameter in the HTTP request as a variable to replace it. For example, as shown in the figure above, the yellow part is the variable parameter.
Attack type
There are four parameters in Attack type, as shown in the figure below:
Sniper
Sniper is to assign the values in the dictionary you added to our multiple parameters at once to try combinations. For example, we set three parameters, namely a, b, c, and there are five values in the dictionary (1, 2, 3, 4, 5), then in this mode Burp will replace a with the value in the dictionary, b and c keep the original value, then b will replace the value in the dictionary, a and c keep the original value, and c will use this analogy.
Battering ram
Battering ram is to try to replace abc assignments with the added dictionary at the same time.
Pitchfork
Pitchfork requires the user to import three dictionaries and then replace the variables in sequence.
Cluster bomb
Cluster bomb also requires the user to import three dictionaries, but it will replace the values in each dictionary with variable testing, such as the a variable. After dictionary one is tested, dictionary two and three will also be replaced.
Payload
Payload is used to import a dictionary:
Simple list
The Simple list definition under this module is the most basic and suitable for small amounts of data.
Brute forcer
Brute forcer is a pure brute force attack. After selecting this module, it will try all the contents of the dictionary.
Options
Options is the last module of Intruder. Its function is to set threads and other functions.
Number of chreads, the amount of threads.
Number of retries on network failure is the number of retries due to network failure. Three times means retrying the connection three times.
Pause before retry, when retrying a failed request, Burp will wait for the specified time (in milliseconds) after the failure before retrying. If the server is flooded with traffic, or has intermittent issues, it's a good idea to wait a certain amount of time before retrying, the default value is 2000 milliseconds.
Repeater
Repeater is the web page request header. Generally, this function is used to capture packets through Proxy and then send them via Send.
The main thing is to modify the various parameters of the request, etc., then click go in the upper left corner to send it, then receive the request on the right, and display the request and status on the right, which is mostly used for fuzz testing of HTTP requests.
Decoder
The Decoder module is a convenient encoder, so no more description will be given.
Comparer
The Comparer module is a file comparison function and is very simple. Readers are asked to understand it by themselves.
Burpsuite main advantages
Burp Scanner includes a complete JavaScript analysis engine that uses a combination of static (SAST) and dynamic (DAST) technologies to detect security vulnerabilities in client-side JavaScript, such as DOM-based cross-site scripting.
Burp pioneered the use of highly innovative out-of-band technology (OAST) to enhance traditional scanning models. Burp Collaborator technology allows Burp to detect server-side vulnerabilities that are completely invisible to the external behavior of the application, and can even report vulnerabilities that are triggered asynchronously after the scan is complete.
Burp’s scanning logic is constantly updated with enhancements to ensure it can find the latest vulnerabilities and new edge cases for existing vulnerabilities. In recent years, Burp has been the first scanner to detect new vulnerabilities pioneered by Burp's research team, including template injection and network cache poisoning. Continuous updates
All reported vulnerabilities include detailed customization recommendations. This includes a complete description of the problem and step-by-step fix recommendations. Dynamically generate advisory wording for each individual issue and accurately describe any special features or remediation points.
Burpsuite update log
Optimize user feedback issues and improve detailed experience
Special instructions:
Hello, the software you are about to use is an auxiliary tool and may be intercepted and checked by major anti-virus software. There may be risks in using this software. Please pay attention to avoid it. If you want to continue using it, it is recommended to close various anti-virus software before using it. .
Attached is the software package decompression password: softwaredownload4.com
Huajun editor recommends:
Burpsuite has always been the most commonly used software by most Internet users. Huajun Software Park also hasNetwork traffic statistics tool,Webcam search tool,TrafficMonitor (computer network speed monitoring floating window),FPort,FreePortScannerIt is also a software that is very popular among netizens. You can download it from Huajun Software Park!
it works
it works
it works