Burp Suite Web Application Testing
This skill should be used when the user asks to "intercept HTTP traffic", "modify web requests", "use Burp Suite for testing", "perform web vulnerability scanning", "test with Burp Repeater", "analyze HTTP history", or "configure proxy for web testing". It provides comprehensive guidance for using Burp Suite's core features for web application security testing.
Author
zebbern
Category
Development ToolsInstall
Download and extract to your skills directory
Copy command and send to OpenClaw for auto-install:
Burp Suite Web Application Testing - Complete Guide to Web Application Security Testing
Skill Overview
This is a professional Burp Suite user guide to help you master core operations such as intercepting HTTP traffic, modifying requests, vulnerability scanning, and penetration testing, systematically discovering web application security vulnerabilities.
Applicable Scenarios
1. Web Application Penetration Testing
When you need to conduct a security assessment of a target website, use Burp Suite to intercept and analyze HTTP traffic to find common vulnerabilities such as SQL injection, XSS, and authorization bypass. By replaying requests with Repeater, performing automated attacks with Intruder, and scanning for vulnerabilities with Scanner, you can comprehensively improve testing efficiency.
2. Business Logic Security Validation
When testing business logic flaws like e-commerce price tampering, unauthorized access, and authentication bypass, intercept and modify request parameters directly to verify whether the server properly validates client input. For example, modify shopping cart price parameters or test access to other users' data.
3. API Endpoint Security Testing
When testing REST APIs and GraphQL endpoints for security, capture API requests via Burp Proxy and use Repeater to test parameter tampering, injection attacks, and unauthorized access to ensure the security of the interfaces.
Core Features
HTTP Traffic Interception and Modification
Intercept all HTTP/HTTPS traffic between the browser and server via the Burp Proxy module, and view request headers, parameters, and response content in real time. Modify any parameter before the request is sent to the server to test for input validation vulnerabilities. Supports one-click enable/disable interception for quick switching of testing modes.
Repeater - Request Replay
Send any request to Repeater for manual testing, quickly iterate different parameter combinations without repeating browser actions. Supports request history navigation, response comparison, and length sorting to efficiently identify anomalous responses. It is a core tool for fuzzing and manual vulnerability discovery.
Automated Vulnerability Scanning (Professional edition)
Use Burp Scanner to automatically discover common security vulnerabilities, including injection attacks, cross-site scripting, information disclosure, and more. Provides four scan modes (Lightweight, Fast, Balanced, Deep); choose the appropriate depth and duration based on testing needs. Scan results include detailed vulnerability descriptions, reproduction requests, and remediation advice.
Frequently Asked Questions
Can the free version of Burp Suite be used?
The Community (free) edition provides core modules such as Proxy, Repeater, and Intruder (with limited functionality), which are sufficient for most manual penetration testing needs. The main limitation is the absence of the automated Scanner vulnerability scanning feature. If you're learning or using it personally, the free edition is completely adequate; for enterprise-level bulk scanning, the Professional edition is recommended.
Why can't HTTPS requests be intercepted?
HTTPS traffic requires installing and trusting Burp Suite's CA certificate in order to decrypt. Steps: 1) Visit http://burp in your browser to download the certificate; 2) Import the certificate into the browser or system Trusted Root Certification Authorities; 3) Restart the browser. After successful installation, HTTPS traffic can be intercepted and viewed normally.
Will Burp Suite scanning get you blocked?
High-intensity scanning may trigger the target server's WAF protections or rate limits, leading to IP blocking. Recommendations: 1) Confirm with the target party before scanning; 2) Use Balanced or Lightweight mode; 3) Set a reasonable request rate; 4) Perform scans in a test environment. Burp provides scan rate control features that can dynamically adjust based on the target's responses.