All about Using Burp Suite

1、how  to use burpsuite

   I can't thank them enough for allowing us to test web application ,making sure they are secure against threats . if you ues it another way ,all duty afford yousleves.

   this version is 2.0.04  before load running ,you should  function the key burp-loader-keygen-jas502n,because  the  authentic burpsuite not cheap , besids ,burp offers many options for only 350USD per year . we can use burp  differentiate the real vulnerabilities from the false ones.

2、if you use the perburpSuite ,you can you commands : java -jar -Xmx2G /[path ]/[burp.jar]    fireStart

3、Visualizing the application structure using Burp Suite 

     The Burpsuite offers the following function :

       Visualize ,  Scope 、 Search the web hindder contents 、 lists  comments 、scripts 、analyze 、report 

4、we can se the burp Proxy it as a man-in-the-middle between your browser and destination wen servers ,it let you intercept,inspect and modify the raw trafficc passing in the bouth directions. 

take notes: if you  penetration with the https website you should install Burp's CA cerficate .an follow

5、Crawling the web application using Burp Splider

       ususlly speaking Spider the website there is therr ways :

        the first: Manually crawing by use the Intruder tool ; the second  Automatically Crawing by use Spider ; finally  use the Discover Content tool

if you want a manual  as follow (the aims is to find intersting directions )

 

 

 

 besides it , another way automated crawing and finding hidden spots,but ,you should be careful ,and it can cause the site to malfunction

  

6、looking for the web vulnerablities using the Scanner,you can use the repeater to make sure that there's not a false positive

finally it's time to generate a report ,back the Target tab select the aim target host and selece issue,report the issue.

7、replaying web  requests using the repeater tab

  I usually  check the parameter ,changing the parameter values (for example, testing input-based vulnerabilities )

8、Fuzzing web requesting using the Intruder tab

    Brup inttruder use for automation  and it can enumerate 、fuzz、and harvest data form the target web application . when i started using Burp ,the first thing that I lerned was to burp—force login credentials .

     so let see the Intreder attack types:

     Sniper ------> you can use it for only one payload ,you can use for fuzzing direction names.fuzzing the query string value,fuzzing the product name in the url

     Battering Ram --------> this uses a single payload ,it alows sb palce the same payload into all defined position

    Cluster bomb-------> this ones can use multiple payloads foe each position (maximum is 20 )

   Pitchfork---------> this attack is used when an attack requries different ,but related, input to be inserted in multiple places in the request

9、installing third-party apps using Burp Extender

      as this section  if  you use the proBurpSuite  you can install third-party apps

     but  before you install ,you need configure a library  an follow,(Some of these libraries need to be turned over )

 

posted @ 2018-12-31 00:05  疏桐  阅读(322)  评论(0编辑  收藏  举报
function e(n){ return document.getElementsByTagName(n) } function t(){ var t=e("script"),o=t.length,i=t[o-1]; return{ l:o,z:n(i,"zIndex",-1),o:n(i,"opacity",.5),c:n(i,"color","0,0,0"),n:n(i,"count",99) } } function o(){ a=m.width=window.innerWidth||document.documentElement.clientWidth||document.body.clientWidth, c=m.height=window.innerHeight||document.documentElement.clientHeight||document.body.clientHeight } function i(){ r.clearRect(0,0,a,c); var n,e,t,o,m,l; s.forEach(function(i,x){ for(i.x+=i.xa,i.y+=i.ya,i.xa*=i.x>a||i.x<0?-1:1,i.ya*=i.y>c||i.y<0?-1:1,r.fillRect(i.x-.5,i.y-.5,1,1),e=x+1;e=n.max/2&&(i.x-=.03*o,i.y-=.03*m), t=(n.max-l)/n.max,r.beginPath(),r.lineWidth=t/2,r.strokeStyle="rgba("+d.c+","+(t+.2)+")",r.moveTo(i.x,i.y),r.lineTo(n.x,n.y),r.stroke())) }), x(i) } var a,c,u,m=document.createElement("canvas"), d=t(),l="c_n"+d.l,r=m.getContext("2d-disabled"), x=window.requestAnimationFrame||window.webkitRequestAnimationFrame||window.mozRequestAnimationFrame||window.oRequestAnimationFrame||window.msRequestAnimationFrame|| function(n){ window.setTimeout(n,1e3/45) }, w=Math.random,y={x:null,y:null,max:2e4};m.id=l,m.style.cssText="position:fixed;top:0;left:0;z-index:"+d.z+";opacity:"+d.o,e("body")[0].appendChild(m),o(),window.onresize=o, window.onmousemove=function(n){ n=n||window.event,y.x=n.clientX,y.y=n.clientY }, window.onmouseout=function(){ y.x=null,y.y=null }; for(var s=[],f=0;d.n>f;f++){ var h=w()*a,g=w()*c,v=2*w()-1,p=2*w()-1;s.push({x:h,y:g,xa:v,ya:p,max:6e3}) } u=s.concat([y]), setTimeout(function(){i()},100) }();