Intercept client-side requests
Burp Suite, a framework of web application pentesting tools, is widely regarded as the de facto tool to use when performing web app testing. Throughout this room, we'll take a look at the basics of installing and using this tool as well as it's various major components. Reference links to the associated documentation per section have been provided at the bottom of most tasks throughout this room. full tutorial of burp suite
we will learn how to use
Burp to intercept browser network traffic.
Once the web
browser opens, navigate to the following site:
http://testasp.vulnweb.com/Login.asp?RetURL=%2FDefault%2Easp%3F
Once there, go back to Burp and turn ON intercept
mode. Then, enter any username and password combination into the site and click
“Login”. As you will see, the page will remain in a loading state. This
is because Burp has now intercepted the request we sent to the server,
and is holding it for us to manipulate.
Now, we will start FoxyProxy in our browser.
Go back to Burp and you will find the intercepted request, along with the username and password data that we entered. To navigate through the different requests Burp is intercepting, simply press the “Forward” button to send the request to the server and view the next request.
You can also alter any text portion of web traffic when Burb interception mode is ON. Try to change “tfUName=admin” and “tfUPass=none” and press the “Forward” button. Those are valid credentials for the green-colored page, and you will be granted access to the next page.
Full Tutorial of Burp Suite
Brought to you by Hacking Truth
to you by
Hacking Truth
Disclaimer
All tutorials are for informational and educational
purposes only and have been made using our own routers, servers, websites and
other vulnerable free resources. we do not contain any illegal activity. We
believe that ethical hacking, information security and cyber security should
be familiar subjects to anyone using digital information and computers.
Hacking Truth is against misuse of the information and we strongly suggest
against it. Please regard the word hacking as ethical hacking or penetration
testing every time this word is used. We do not promote, encourage, support or
excite any illegal activity or hacking.