Burp Suite Web Application Testing
This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for testing", "perform web vulnerability scanning", "test with Burp Repeater", "analyze HTTP history", or "configure proxy for web testing". It provides comprehensive guidance for using Burp Suite's core features for web application security testing.
Burp Suite Web Application Testing
Purpose
Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay, automated vulnerability scanning, and manual testing workflows. This skill enables systematic discovery and exploitation of web application vulnerabilities through proxy-based testing methodology.
Inputs / Prerequisites
Required Tools
Environment Setup
Editions Comparison
| Feature | Community | Professional |
|---|---|---|
| Proxy | ✓ | ✓ |
| Repeater | ✓ | ✓ |
| Intruder | Limited | Full |
| Scanner | ✗ | ✓ |
| Extensions | ✓ | ✓ |
Outputs / Deliverables
Primary Outputs
Core Workflow
Phase 1: Intercepting HTTP Traffic
Launch Burp's Browser
Navigate to integrated browser for seamless proxy integration:
Configure Interception
Control which requests are captured:
Proxy > Intercept > Intercept is on/off toggleWhen ON: Requests pause for review/modification
When OFF: Requests pass through, logged to history
Intercept and Forward Requests
Process intercepted traffic:
View HTTP History
Access complete traffic log:
Phase 2: Modifying Requests
Intercept and Modify
Change request parameters before forwarding:
Common Modification Targets
| Target | Example | Purpose |
|---|---|---|
| Price parameters | price=1 | Test business logic |
| User IDs | userId=admin | Test access control |
| Quantity values | qty=-1 | Test input validation |
| Hidden fields | isAdmin=true | Test privilege escalation |
Example: Price Manipulation
POST /cart HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencodedproductId=1&quantity=1&price=100
Modify to:
productId=1&quantity=1&price=1Result: Item added to cart at modified price.
Phase 3: Setting Target Scope
Define Scope
Focus testing on specific target:
Filter by Scope
Remove noise from HTTP history:
Scope Benefits
Phase 4: Using Burp Repeater
Send Request to Repeater
Prepare request for manual testing:
Modify and Resend
Test different inputs efficiently:
1. View request in Repeater tab
Modify parameter values
Click Send to submit request
Review response in right panel
Use navigation arrows to review request history Repeater Testing Workflow
Original Request:
GET /product?productId=1 HTTP/1.1Test 1: productId=2 → Valid product response
Test 2: productId=999 → Not Found response
Test 3: productId=' → Error/exception response
Test 4: productId=1 OR 1=1 → SQL injection test
Analyze Responses
Look for indicators of vulnerabilities:
Phase 5: Running Automated Scans
Launch New Scan
Initiate vulnerability scanning (Professional only):
Scan Configuration Options
| Mode | Description | Duration |
|---|---|---|
| Lightweight | High-level overview | ~15 minutes |
| Fast | Quick vulnerability check | ~30 minutes |
| Balanced | Standard comprehensive scan | ~1-2 hours |
| Deep | Thorough testing | Several hours |
Monitor Scan Progress
Track scanning activity:
Review Identified Issues
Analyze scan findings:
- Advisory: Description and remediation
- Request: Triggering HTTP request
- Response: Server response showing vulnerability
Phase 6: Intruder Attacks
Configure Intruder
Set up automated attack:
Attack Types
| Type | Description | Use Case |
|---|---|---|
| Sniper | Single position, iterate payloads | Fuzzing one parameter |
| Battering ram | Same payload all positions | Credential testing |
| Pitchfork | Parallel payload iteration | Username:password pairs |
| Cluster bomb | All payload combinations | Full brute force |
Configure Payloads
Positions Tab:
POST /login HTTP/1.1
...
username=§admin§&password=§password§Payloads Tab:
Set 1: admin, user, test, guest
Set 2: password, 123456, admin, letmein
Analyze Results
Review attack output:
Quick Reference
Keyboard Shortcuts
| Action | Windows/Linux | macOS |
|---|---|---|
| Forward request | Ctrl+F | Cmd+F |
| Drop request | Ctrl+D | Cmd+D |
| Send to Repeater | Ctrl+R | Cmd+R |
| Send to Intruder | Ctrl+I | Cmd+I |
| Toggle intercept | Ctrl+T | Cmd+T |
Common Testing Payloads
# SQL Injection
' OR '1'='1
' OR '1'='1'--
1 UNION SELECT NULL--XSS
<script>alert(1)</script>
"><img src=x onerror=alert(1)>
javascript:alert(1)Path Traversal
../../../etc/passwd
..\..\..\..\windows\win.iniCommand Injection
; ls -la
| cat /etc/passwd
whoamiRequest Modification Tips
Constraints and Guardrails
Operational Boundaries
Technical Limitations
Best Practices
Examples
Example 1: Business Logic Testing
Scenario: E-commerce price manipulation
price=9999 parameter in POST bodyprice=1Finding: Server trusts client-provided price values.
Example 2: Authentication Bypass
Scenario: Testing login form
username=admin' OR '1'='1'--Finding: SQL injection in authentication.
Example 3: Information Disclosure
Scenario: Error-based information gathering
productId parameterproductId=1 to productId=testFinding: Apache Struts 2.5.12 disclosed in stack trace.