If you are looking for software to use, go to Huajun Software Park! software release

Hello, if there is a need for software inclusion, please package the software and attach the software name, software introduction, software-related screenshots, software icon, soft copy, and business license (if you do not have a business license, please provide the front and back of the corresponding developer ID card) and a photo of yourself holding your ID card) and send it to your email http://softwaredownload4.com/sbdm/user/login

Close >>

Send to email:news@onlinedown.net

Close >>

Burpsuite

Burpsuite 2022.5 official version

QR code
  • Software licensing: shareware
  • Software size: 512.03MB
  • Software rating:
  • Software type: Domestic software
  • Update time: 2024-10-31
  • Application platform: winall
  • Software language: Simplified Chinese
  • Version: 2022.5 Official version

Download the service agreement at the bottom of the page

Software introduction Related topics FAQ Download address

Basic introduction
Burpsuite section first LOGO
The official version of Burpsuite is a penetration testing tool built for information security practitioners. Burpsuite PC can be used to analyze unpredictable applications, including the randomness of session tokens and important data items, and to fully enumerate the application's content and functionality. Burpsuite also uses automatic testing and semi-automatic testing, including Proxy, Spider, Scanner, Intruder, Repeater, Sequencer, Decoder, Comparer and other tool modules.

Burpsuite screenshot

Burpsuite software introduction

Burpsuite is a powerful penetration testing tool from the past. It is an integrated platform for attacking web applications. It contains many tools, such as Proxy, Spider, Scanner, Intruder, Repeater, Sequencer, Decoder, Comparer and other tool modules, and has designed many interfaces for these tools to facilitate acceleration. The process of attacking an application. All tools share a powerful and extensible framework that can handle and display HTTP messages, persistence, authentication, proxies, logging, and alerts. By intercepting HTTP/HTTPS web data packets, it acts as a middleman between browsers and related applications, intercepting, modifying, and replaying data packets for testing. It is very suitable for information security practitioners.

Burp Suite is an integrated penetration testing tool that is essential for information security practitioners. It adopts automatic testing and semi-automatic testing, and includes Proxy, Spider, Scanner, Intruder, Repeater, Sequencer, Decoder, Comparer and other tool modules. By intercepting HTTP/HTTPS web data packets, acting as a middleman between browsers and related applications, intercepting, modifying, and replaying data packets for testing, it is a necessary Swiss Army knife for web security personnel.

Burpsuite software features

Burp Suite provides excellent analysis functions. You can find tools to analyze errors in the software.

If your software encounters an error, you need to analyze the cause of the error

If there is a vulnerability in your website program, you need to analyze the vulnerability in the software

Use this Burp Suite software to analyze your vulnerabilities

​ ​Display the cause of the error in the software, allowing users to find vulnerabilities in the current web

Supports more tools to help you scan the web and analyze all problems immediately

Burpsuite software features

​ 1. Burp Suite is a professional vulnerability analysis software that can detect vulnerabilities in your website.

2. Suitable for maintenance personnel to safely maintain your computer system

​​ 3. Supports repeated scanning function to re-detect the current system content

​​ 4. Supports more extended content, and nearly ten tools to maintain your system

5. Supports manual selection of analysis content, and can add analysis modules

​ 6. Supports common vulnerability analysis and can detect more than 100 vulnerabilities

​ 7. Burp Suite Enterprise Edition can perform scheduled scans at specific times or perform one-time scans on demand.

​ 8. Repeat scans can be configured to run indefinitely or until a defined endpoint.

​ 9. View the entire scan history of a given website in one location.

Burpsuite installation steps

​​ 1. Download Burpsuite in Huajun Software Park, then unzip it, click to open the registration machine: burp-loader-keygen.jar, then click run, fill in the license text as you like, then copy and paste the generated license into the opened burp, click next

Burpsuite screenshot

​ ​ 2. Then we click manual activation

Burpsuite screenshot

3. Then we paste the request into the activation request, the response will be automatically generated, and then paste it into the bottom response in burp, click Next

Burpsuite screenshot

​​ 4. Burpsuite is downloaded successfully, so we can use it.


Burpsuite screenshot

Burpsuite usage tutorial

Introduction to Burp module

- Target

Target, as the first module of Burp, functions as a site map. All web pages that pass through the proxy server will appear on the left side and will be displayed here.

When https://www.csdn.net/ is accessed, the "Target" function module has crawled all access records and displayed them on the left, as shown in the figure.

Burpsuite screenshot

Of course, if you want to use Burp for testing, you must first modify the proxy of the local browser.

The following uses Firefox as an example to explain the basic configuration of Burp.

​ ​ ​ First, you need to find the proxy settings in Firefox settings and set it to the same IP as the Burp software.

Burpsuite screenshot

What needs to be noted is that the port number needs to be consistent with the port number set above, both are 8080

Burpsuite screenshot

Proxy

In Burp, the "Proxy" module is a crucial module, and its layout is like this.

Burpsuite screenshot

The role of the intercept module in the Proxy module is to intercept request traffic between HTTP/HTTPS. If the third button "intercept is off", here is the awareness that interception is not turned on. If it is turned on, it will change to "intercept is on"

Now we intercept the HTTPS traffic of the CSDN login page.

After I entered my account password, I clicked to turn on interception, and the status changed to "intercept is on". At this time, the traffic requested through this HTTPS will be intercepted and not sent, and will be displayed under your "intercept" module, as shown in the figure shown.

Burpsuite screenshot

                                                                                                                                                                 all both all all all all being all

&username=rNma0y&password=147258369&rememberMe=true<=LT-1269028-Xs5rYscId3GAlIBVB6NgisRx6zJCo5&execution=e2s1&_eventId=submit

When interception is turned on, the entire web page cannot be requested because all requests sent have been intercepted. If you want to access the next web page, select the first button "Forward" in the module. This button means release. , causing him to send this data packet through the request.

Drop

Drop means discarding the package and re-capturing the data.

Action

The functions of Action are as follows. It can send requests to various modules for interaction.

Burpsuite screenshot

HTTP history

The function of this module is to intercept the history of packets, and keep the history of previously intercepted data packets here.

Scan

The Scan function module is used for scanning. It is a web application scanner and is unique to the Pro version. The Community version does not have this function.

Burpsuite screenshot

The method of use is to right-click the menu after capturing the packet, and "Do a active scan" will appear. After clicking, it will be sent to the Scan module of Burp. The most important indication will be highlighted in yellow.

Burpsuite screenshot

Intruder

The Intruder module is the most useful part of the entire Burp tool. It is often used in brute force cracking. You can implement automated attacks by adding a dictionary.

Burpsuite screenshot

You can operate HTTP requests under Position under the Intruder module. You can set a separate parameter in the HTTP request as a variable to replace it. For example, as shown in the figure above, the yellow part is the variable parameter.

Attack type

There are four parameters in Attack type, as shown in the figure below:

Burpsuite screenshot

Sniper

Sniper is to assign the values ​​​​in the dictionary you added to our multiple parameters at once to try combinations. For example, we set three parameters, namely a, b, c, and there are five values ​​​​in the dictionary (1, 2, 3, 4, 5), then in this mode Burp will replace a with the value in the dictionary, b and c keep the original value, then b will replace the value in the dictionary, a and c keep the original value, and c will use this analogy.

Battering ram

Battering ram is to try to replace abc assignments with the added dictionary at the same time.

Pitchfork

Pitchfork requires the user to import three dictionaries and then replace the variables in sequence.

Cluster bomb

Cluster bomb also requires the user to import three dictionaries, but it will replace the values ​​in each dictionary with variable testing, such as the a variable. After dictionary one is tested, dictionary two and three will also be replaced.

Payload

Payload is used to import a dictionary:

Burpsuite screenshot

Simple list

The Simple list definition under this module is the most basic and suitable for small amounts of data.

Burpsuite screenshot

Brute forcer

Brute forcer is a pure brute force attack. After selecting this module, it will try all the contents of the dictionary.

Options

Options is the last module of Intruder. Its function is to set threads and other functions.

Number of chreads, the amount of threads.

Number of retries on network failure is the number of retries due to network failure. Three times means retrying the connection three times.

Pause before retry, when retrying a failed request, Burp will wait for the specified time (in milliseconds) after the failure before retrying. If the server is flooded with traffic, or has intermittent issues, it's a good idea to wait a certain amount of time before retrying, the default value is 2000 milliseconds.

Repeater

Repeater is the web page request header. Generally, this function is used to capture packets through Proxy and then send them via Send.

​​The main thing is to modify the various parameters of the request, etc., then click go in the upper left corner to send it, then receive the request on the right, and display the request and status on the right, which is mostly used for fuzz testing of HTTP requests.

Burpsuite screenshot

Decoder

The Decoder module is a convenient encoder, so no more description will be given.

Comparer

The Comparer module is a file comparison function and is very simple. Readers are asked to understand it by themselves.

Burpsuite main advantages

Burp Scanner includes a complete JavaScript analysis engine that uses a combination of static (SAST) and dynamic (DAST) technologies to detect security vulnerabilities in client-side JavaScript, such as DOM-based cross-site scripting.

Burp pioneered the use of highly innovative out-of-band technology (OAST) to enhance traditional scanning models. Burp Collaborator technology allows Burp to detect server-side vulnerabilities that are completely invisible to the external behavior of the application, and can even report vulnerabilities that are triggered asynchronously after the scan is complete.

Burp’s scanning logic is constantly updated with enhancements to ensure it can find the latest vulnerabilities and new edge cases for existing vulnerabilities. In recent years, Burp has been the first scanner to detect new vulnerabilities pioneered by Burp's research team, including template injection and network cache poisoning. Continuous updates

                          All reported vulnerabilities include detailed customization recommendations. This includes a complete description of the problem and step-by-step fix recommendations. Dynamically generate advisory wording for each individual issue and accurately describe any special features or remediation points.

Burpsuite update log

​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​​

Optimize user feedback issues and improve detailed experience

Special instructions:

Hello, the software you are about to use is an auxiliary tool and may be intercepted and checked by major anti-virus software. There may be risks in using this software. Please pay attention to avoid it. If you want to continue using it, it is recommended to close various anti-virus software before using it. .

Attached is the software package decompression password: softwaredownload4.com

Huajun editor recommends:

Burpsuite has always been the most commonly used software by most Internet users. Huajun Software Park also hasNetwork traffic statistics tool,Webcam search tool,TrafficMonitor (computer network speed monitoring floating window),FPort,FreePortScannerIt is also a software that is very popular among netizens. You can download it from Huajun Software Park!


FAQ