

You can click Open Browser to use Burp’s built-in browser, or open your own browser if you have configured the proxy settings. Instead of sending HTTP request directly to the target, your browser will send the request to the proxy server and the proxy server will forward (or edit/drop) the request to the target.įirst, open burp and go to the Proxy tab.

If you don’t know what a proxy server is, Wikipedia gives a pretty good explanation. Proxy #īurp Proxy is a web proxy server between your browser and target applications, and lets you intercept, inspect, and modify the raw traffic passing in both directions. To do that, we will try to perform OS Comand Injection attack and login bruteforce attack. In this writeup, we will cover the following: You may want to create an account first before continuing. *In this writeup, we will try to attack online labs by PortSwigger.
Burp suite repeater install#
Additionally, you may want to install FoxyProxy so you can easily change your browser’s proxy setting. Use burp, and you can find out how by going to this link. You may need to configure your browser proxy setting to Setting Up #īurp has its own built-in chromium browser, but you canĪlso configure it to work with external browsers like Chrome and Firefox. automatically scan the website for vulnerabilities), but that is a different topic and will not be covered in this writeup. Burp allows us to easily modify and send these HTTP requests.īurp also has a lot of advanced features (e.g.

When we are dealing with website, these inputs are in the form of HTTP requests, be it GET, POST, or other type of requests. When we are doing security testing, we want to give the application (lots of) unusual inputs.
