Catalog / Burp Suite Cheatsheet
Burp Suite Cheatsheet
A comprehensive cheat sheet covering essential Burp Suite tools, features, and workflows for web application security testing.
Burp Suite Basics
Core Tools Overview
Proxy: Intercepts and modifies HTTP/S traffic between your browser and web servers. |
Repeater: Manually modify and resend individual HTTP requests. |
Intruder: Automates customized attacks, such as fuzzing and brute-forcing. |
Scanner: Automatically crawls and audits web applications for vulnerabilities (Burp Suite Professional only). |
Sequencer: Analyzes the randomness of session tokens. |
Decoder: Encodes and decodes data in various formats. |
Comparer: Visually compares differences between two sets of data. |
Extender: Allows extending Burp Suite’s functionality using custom extensions. |
Setting up Burp Proxy
|
In Burp Suite, go to Proxy > Options and configure a listener on a specific interface and port (e.g., 127.0.0.1:8080). |
|
Configure your browser to use Burp Suite as its proxy server. This usually involves setting the HTTP and HTTPS proxy settings to the same address and port as your Burp Suite listener. |
|
To intercept HTTPS traffic, you need to install Burp Suite’s CA certificate in your browser. Access |
Essential Keyboard Shortcuts
|
Intercept Next Request |
|
Send to Repeater |
|
Send to Intruder |
|
Send to Scanner (Professional Only) |
|
Send to Sequencer |
|
Send to Decoder |
Repeater and Intruder
Using Repeater
|
|
|
|
Intruder Attack Types
Sniper: |
Uses a single payload set, iterating through each payload position. |
Battering Ram: |
Uses a single payload set, inserting the same payload into all defined payload positions in each request. |
Pitchfork: |
Uses multiple payload sets, one for each payload position. Iterates through the payload sets in parallel. |
Cluster Bomb: |
Uses multiple payload sets, one for each payload position. Iterates through every possible combination of payloads. |
Intruder Payloads
|
|
|
|
|
Burp Scanner (Professional)
Scanning Modes
Passive Scanning: |
Analyzes traffic as it passes through Burp Proxy without actively sending requests. Useful for identifying information disclosure and insecure configurations. |
Active Scanning: |
Sends crafted requests to the application to identify vulnerabilities. More thorough but can be intrusive. |
Scan Configuration
|
|
|
Interpreting Scan Results
|
|
|
Advanced Techniques
Using Burp Collaborator
|
|
|
|
Macros
|
|
|
Extender API
|
|
|