What is Burp Suite?
The tools offered by BurpSuite are:
1. Spider:
2. Proxy:
BurpSuite contains an intercepting proxy that lets the user see and modify the contents of requests and responses while they are in transit. It also lets the user send the request/response under monitoring to another relevant tool in BurpSuite, removing the burden of copy-paste. The proxy server can be adjusted to run on a specific loop-back ip and a port. The proxy can also be configured to filter out specific types of request-response pairs.
3. Intruder:
It is a fuzzer. This is used to run a set of values through an input
point. The values are run and the output is observed for success/failure and
content length. Usually, an anomaly results in a change in response code or
content length of the response. BurpSuite allows brute-force, dictionary file
and single values for its payload position. The intruder is used for:
Brute-force attacks on password forms, pin forms, and other such forms.
The dictionary attack on password forms, fields that are suspected of
being vulnerable to XSS or SQL injection.
Testing and attacking rate limiting on the web-app.
4. Repeater:
Repeater lets a user send requests repeatedly with manual modifications.
It is used for:
- Verifying whether the user-supplied values are being verified.
- If user-supplied values are being verified, how well is it being done?
- What values is the server expecting in an input parameter/request header?
- How does the server handle unexpected values?
- Is input sanitation being applied by the server?
- How well the server sanitizes the user-supplied inputs?
- What is the sanitation style being used by the server?
- Among all the cookies present, which one is the actual session cookie.
- How is CSRF protection being implemented and if there is a way to bypass it?
5. Sequencer:
The sequencer is an entropy checker that checks for the randomness of
tokens generated by the webserver. These tokens are generally used for
authentication in sensitive operations: cookies and anti-CSRF tokens are
examples of such tokens. Ideally, these tokens must be generated in a fully
random manner so that the probability of appearance of each possible character
at a position is distributed uniformly. This should be achieved both bit-wise
and character-wise. An entropy analyzer tests this hypothesis for being true.
It works like this: initially, it is assumed that the tokens are random. Then
the tokens are tested on certain parameters for certain characteristics. A term
significance level is defined as a minimum value of probability that the token
will exhibit for a characteristic, such that if the token has a characteristics
probability below significance level, the hypothesis that the token is random
will be rejected. This tool can be used to find out the weak tokens and
enumerate their construction.
6. Decoder:
Decoder lists the common encoding methods like URL, HTML, Base64, Hex, etc. This tool comes handy when looking for chunks of data in values of parameters or headers. It is also used for payload construction for various vulnerability classes. It is used to uncover primary cases of IDOR and session hijacking.
7. Extender:
BurpSuite supports external components to be integrated into the tools suite to enhance its capabilities. These external components are called BApps. These work just like browser extensions. These can be viewed, modified, installed, uninstalled in the Extender window. Some of them are supported on the community version, but some require the paid professional version.
8. Scanner:
The scanner is not available in the community edition. It scans the
website automatically for many common vulnerabilities and lists them with
information on confidence over each finding and their complexity of
exploitation. It is updated regularly to include new and less known
vulnerabilities.







Comments
Post a Comment