Burp Proxy Tool

2/14/2022by admin
  1. Burp Proxy Tool Windows 10
  2. Burp Suite Tools
  3. Burp Proxy Tool Windows
  4. Burp Suite Pro

Introduction:

Burp suite is an intercepting proxy that can intercept requests from client side & responses from the server side. The ability to intercept allows hackers to manipulate requests/responses to look for & exploit vulnerabilities. It is mainly used by experienced security engineers & pen testers as it presents a single interface with various integrated toolsets.

Burp Suite has multiple capabilities. The professional & Enterprise version of the tool have scanner feature that scans a target web application / API to discover vulnerabilities. This is possible only if we are able to intercept the requests first.

Burp Suite Professional also as an extender tab where in we can add a set of extensions that can look for additional security violations or work slightly in a different way to discover some default vulnerability checks applied by the scanner

Getting Burp Suite :

Burp Suite is available in following types

Burp Suite Community

Burp Suite Professional

Burp Suite Enterprise

The community version is available for everyone & free to use. It can be downloaded from the portswigger official website. The Professional & Enterprise versions are available as a commercial use. If you are someone that didn’t try this tool & if your organization hasn’t requested for a trial license before then you can use this chance to request for trial version valid for 30 days with full features(note: this option is available while publishing this content, may change in future). Assume we are going to request for trial license for valid reasons to make best use of it.

What is BURPSUITE: Burp Suite is a Java based Web Penetration Testing framework. It has become an industry standard suite of tools used by information security professionals. Burp Suite helps you identify vulnerabilities and verify attack vectors that are affecting web applications. Because of its popularity and breadth as well as depth of features, we have created this useful page as a. Burp Notes - Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created during penetration testing. Logger - Burp Suite Logger: Log activities of all the tools in Burp Suite. Burp Dump - A Burp plugin to dump HTTP(S) requests/responses to a file system.

Installing Burp Suite:

Burp Suite can be run on any operating system (OS) if the OS supports the specific java version installed as it is a java application & available in a JAR format to launch & use the tool.

We are using Burp Suite Pro v2020.2.1 & it requires minimum Java version 8 to install / run the tool.

Configuring Burp Suite:

Before we can use Burp suite, we need to configure it with our client so we can intercept requests/responses. Follow the sections 1,2,3 below to configure

Section 1, Configure browser with Burp Suite

open Burp —> proxy —> Options—> Add Proxy Listener

By Default burp suite runs on 8080 port. so the default proxy listener is localhost:8080. We need to set this proxy listener in our browser to intercept requests/responses.

open Firefox —> Preferences —> Network settings —> set Manual proxy configuration to localhost:8080

Section 2, Install Burp root CA certificate

This is required to intercept encrypted traffic.

open Burp —> proxy —> Options—> click import/export CA certificate to export the certificate

Burp Proxy Tool Windows 10

After the certificate is exported, now open Firefox —> Preferences —> certificates —> Import certificate

Section 3, set Upstream proxy server

In some corporate networks, there is a proxy configured to connect to internet. To access external sites hosted outside the corporate network or to connect to internet we are required to set the upstream proxy.

to set this, open Burp —> User Options —> Add Upstream Proxy Servers

Burp Suite Integrated toolsets:

Repeater : It is used to replay the base request with altered/manipulated request parameters & observe the response from server. This feature helps to confirm the existence of a vulnerability as we can replay & observe responses. It becomes a bit easier to check for access control violations with the use of repeater as we will need to alter specific id’s or resources of a user with another user

Intruder : It is used to target specific request parameters with a list of custom payloads & observe the responses for each of the payloads/manipulated requests.

Sequencer : It is used to check for the strength of the tokens such as session cookies , forgot password tokens or user invited tokens etc.,

Burp Suite Tools

Decoder : It is used to decode/encode data in to specific formats such as base64, url encode/decode, hex format etc.,

Comparer : It is used to compare two requests or responses to check for any variations.

Burp HotKeys:

we can use key board short cuts to traverse between various sections/tabs of the tools. It can configured from user options —> Misc —> Hot keys

on MacOs, some hot key examples are

command+shift+R —> Repeater tab

command+shift+T —> Target tab

command+shift+I —> Intruder tab

Spidering / Crawling :

Crawl is an interesting feature as the tool automatically crawls a target website to discover all traversable links, parameters, resources etc.,It is recommended to set the scope of the spider to ensure only target site is crawled & consider setting specific crawl parameters to ensure the scanner isn’t overloaded with unrealistic crawl settings

for example : Unique location discovered : should be a realistic/appropriate value

Passive scanning:

During this phase the scanner doesn’t actual send any malicious requests on its own to the server, it simply observes all intercepted requests / responses & reports if there are any missing security header settings , secure cookie settings , sensitive tokens in GET request , other passive checks etc.,

some of the passive checks are applied as soon as the requests/responses are intercepted. To do a passive scan to cover all passive rules, we need to add the target site to scope & right click the target site to choose, passively scan this host

Active Scanning:

During this phase the scanner sends malicious requests on its own to the server from the initial or baseline intercepted requests , observes the responses from the server for each of this malicious requests to identify & report vulnerabilities such as SQL Injection, XSS , etc.,

To do an active scan, we need to add the target site to scope & right click the target site to choose, Actively scan this host

Adding Extensions:

Burp suite has an menu option, Extender. Most of the extensions are either developed in python, java or Ruby. For this reason, we need to set the environment settings under Options section of Extender Tab. Generally to set the java environment settings, we need to point to the location of the java JRE bin installed path, like wise for python, we need to set the location of Jythonstandalone.jar file present in our machine.

After the environment settings are completed, we can add extensions in two different ways. The easiest way to add an extension is go to BApp Store under the Extender tab & choose a extension from the list that you may want to add & use as per your need. Just click install from the right pane to install the extension. To successfully install a extension, the relevant environment setting is a must. Some extensions are available for community version but some are available for only professional version of the tool.

Burp Suite BAppStore has a limited set of extensions, there are lot more extensions available from other resources, such as github, we recommend that you use only extensions that are required & to avoid overloads. Some extensions will fall part of the default scanner to look for vulnerabilities but some will need to be used in a manual way.

Disable Extensions :

Burp Proxy Tool Windows

There are couple of ways to disable extensions, to disable all extensions, we can tick the checkbox “Disable extensions” while launching burp.

To disable a specific extension, go to Extender tab —> Extensions —> uncheck a specific extension that you do not wish to use.

Project Options:

Configurations & settings apply to the current project hacking session

(Macros, session Handling rules, cookie jar etc.,)

when following redirections, understand the predefined types, JavaScript-Driven is not enabled by default.

Project options —> HTTP —> Redirections

some useful project options

Project Options—> Misc —> Scheduled Tasks, Burp Collaborator Server

Project Options —> sessions —> Session Handling Rules / Cookie Jar / Macros

User Options:

Configurations & settings that apply to Burp suite

(proxy listener,upstream proxy, hotkeys etc.,)

some useful user options:

User Options —> Display —-> User Interface / HTTP Message Display

User Options —> Misc —> Proxy Interception

Platform Authentication

Saving Options for Future Use

Engagement Tools — Search / Find Comments / Find Scripts / Find References / Analyse Target / Simulate Manual Testing

Search : Used to search for specific strings or to search & look for sensitive information disclosure such as API keys, credentials etc.,

Find Comments : When used shows all comments left over by developers in target site resources

Find References: When used shows the reference of the target site in various places of the intercepted requests / responses

Analyze Target: when used displays, number of dynamic urls, static urls,parameters, unique parameter names

Simulate Manual Testing: Let’s you take a break while the tool automatically sends requests to the target site to avoid session timeouts.

Burp Proxy lies at the heart of Burp's user-driven workflow. It operates as a web proxy server between your browser and target applications, and lets you intercept, inspect, and modify the raw traffic passing in both directions. In this section, we'll take you through some of the core features of Burp Proxy so that you can familiarize yourself with how it works.

Note: Using Burp Proxy may result in unexpected effects in some applications. Until you are fully familiar with its functionality and settings, you should only use Burp Proxy against non-production systems.

Burp Suite Pro

Burp Proxy works in conjunction with the browser that you are using to access the target application. You can either:

  • Use Burp's embedded browser, which requires no additional configuration. Go to the 'Proxy' > 'Intercept' tab and click 'Open Browser'. A new browser session will open in which all traffic is proxied through Burp automatically. You can even use this to test over HTTPS without the need to install Burp's CA certificate.
  • Use an external browser of your choice. For various reasons, you might not want to use Burp's embedded browser. In this case, you need to perform some additional steps to configure your browser to work with Burp, and install Burp's CA certificate in your browser.

Once you have confirmed that your browser is successfully proxying traffic through Burp, you can perform the following steps to help you understand how to use Burp Proxy:

In Burp, go to the 'Proxy' > 'Intercept' tab, and ensure that interception is on (if the button says 'Intercept is off' then click it to toggle the interception status).

Burp suite tools

In your browser, visit any URL. The browser will send a request but will then be stuck waiting for a response.

In Burp, go back to the 'Proxy' > 'Intercept' tab. You should see your browser's request displayed for you to view and edit. Use the Inspector tool to see the different ways of analyzing the message.

Click the 'Forward' button to send the request to the server. In most cases, your browser will make more than one request in order to display the page (for images, etc.). Look at each subsequent request and then forward it to the server. When there are no more requests to forward, your browser should have finished loading the URL you requested.

In your browser, click the 'Refresh' button to reload the current page.

In Burp, this time edit the request on the 'Proxy' > 'Intercept' tab. Change the URL in the first line of the request so that a non-existent item is requested. Forward the request (and any subsequent ones) to the server, then look back in your browser. Although your browser requested the same URL as before, you should see a 'Not found' message. This is because you changed the outgoing request on the fly within Burp.

In Burp, go to the 'Proxy' > 'HTTP history' tab. This contains a table of all HTTP messages that have passed through the Proxy. Select an item in the table, and look at the HTTP messages in the message editor. If you select the item that you modified, you can choose to display either the original or edited request from the drop-down menu.

Click on a column header in the Proxy history. This sorts the contents of the table according to that column. Click the same header again to reverse-sort on that column, and again to clear the sorting and show items in the default order. Try this for different columns.

Within the history table, click on a cell in the leftmost column, and choose a color from the drop-down menu. This will highlight that row in the selected color.

In another row, double-click within the 'Comment' column and type a comment. You can use highlights and comments to annotate the history and identify interesting items.

Above the history table there is a filter bar. Click on the filter bar to show the options available. Try changing the filter settings in various ways, and see the effect on what is shown in the history table. When the Proxy history has become very large, you can use the filter to hide certain types of items, to help find items you are looking for.

Select an item in the history, and show the context menu (usually, by right-clicking your mouse). The options on the context menu are used to drive your testing workflow within Burp. Choose 'Send to Repeater', and go to the 'Repeater' tab.

In Burp Repeater, you will see the selected request has been copied into the Repeater tool for further testing. For more details on sending items between Burp tools, and the overall testing workflow, see Using Burp Suite.

Go to the 'Proxy' > 'Options' tab, and look at all the options that are available. These can be used to change the behavior of the Proxy listeners, define rules to determine what request and response messages are intercepted by the Proxy, perform automatic modification of messages, and control the Proxy's behavior in other ways. For more details, see Burp Proxy Options.

Use the links below for further help on starting to use Burp Proxy:

Comments are closed.