login

Burp Suite, the leading toolkit for web application security testing

Using Burp Suite

The sections below describe the essentials of how to use Burp Suite within your web application testing. For much more information about general techniques and methodologies for web application testing, please refer to The Web Application Hacker's Handbook, which was co-authored by the creator of Burp Suite.

Note: Before starting to use Burp, you first need to get Burp running, configure display settings, configure your browser and Burp to work together, and ideally install Burp's SSL CA certificate in your browser. If you need help with any of these areas, please see the help on Getting started with Burp Suite.

Testing Workflow

Burp is designed to support the activities of a hands-on web application tester. It lets you combine manual and automated techniques effectively, gives you complete control over all of the actions that Burp performs, and provides detailed information and analysis about the applications you are testing.

Some users may not wish to use Burp in this way, and only want to perform a quick and easy vulnerability scan of their application. If this is what you need, please refer to Using Burp as a Point-and-Click Scanner.

The diagram below is a high-level overview of the key parts of Burp's user-driven workflow. Click on each area of the diagram for more detail: 

 

Recon and Analysis

The Proxy tool lies at the heart of Burp's workflow. It lets you use your browser to navigate the application, while Burp captures all relevant information and lets you easily initiate further actions. In a typical test, the recon and analysis phase involves the following tasks:

Tool Configuration

Burp contains a wealth of configuration options, which it is often necessary to use at different stages of your testing, to ensure that Burp works with your target application in the way you require. For example:

Vulnerability Detection and Exploitation

After completing your recon and analysis of the target application, and any necessary configuration of Burp, you can begin probing the application for common vulnerabilities. At the stage, it is often most effective to use several Burp tools at once, passing individual requests between different tools to perform different tasks, and also going back to your browser for some tests. Throughout Burp, you can use the context menu to pass items between tools and carry out other actions.

In Burp's default configuration, it automatically performs live passive scanning of all requests and responses that pass through the Proxy. So before you begin actively probing the application, you might find that Burp Scanner has already recorded some findings that warrant closer investigation.

Burp's tools can be used in numerous different ways to support the process of actively testing for vulnerabilities. Some examples are described below for different types of issues:

Read More

There is extensive documentation for all of Burp's tools and features, and the typical workflow you need to use when testing with Burp.

Use the links below for help about using each of the main Burp tools:

 

User Forum

Get help from other users, at the Burp Suite User Forum:

Visit the forum ›

Thursday, November 27, 2014

v1.6.09

This release fixes a problem affecting some users of 32-bit systems with the new handling of temporary files that was introduced in v1.6.08.

See all release notes ›

Copyright © 2014 PortSwigger Ltd. All rights reserved.