๐งBurp Suite: The Basics
An introduction to using Burp Suite for Web Application pentesting
Last updated
An introduction to using Burp Suite for Web Application pentesting
Last updated
Room Attributes | Value |
---|---|
Deploy the machine attached to the task by pressing the green "Start Machine" button, as well as the AttackBox (using the "Start AttackBox" button at the top of the page) if you are not using your own machine.
No answer needed
HINT: The task above contains the answer in bold text. Paragraph Three.
HINT: Fill in the blank
No answer needed
No answer needed
No answer needed
No answer needed
No answer needed
Note: Assume you are using Windows or Linux (i.e. swap Cmd for Ctrl).
HINT: Use what you learnt in a previous task to look up the keybindings used in Burp Suite, then find a keybinding related to forwarding intercepted proxy messages.
Note: The option is in a dropdown sub-menu.
[Bonus Question -- Optional] Try installing FoxyProxy standard and have a look at the pattern matching features.
No answer needed
No answer needed
http://MACHINE_IP/
and capture it in the proxy.No answer needed
http://MACHINE_IP/
to your scope and change the Proxy settings to only intercept traffic to in-scope targets. See the difference between the amount of traffic getting caught by the proxy before and after limiting the scope.No answer needed
http://MACHINE_IP/
-- we will be using this a lot throughout the module. Visit every page linked to from the homepage, then check your sitemap -- one endpoint should stand out as being very unusual! Visit this in your browser (or use the "Response" section of the site map entry for that endpoint). What is the flag you receive?HINT: You are looking for a suspicious page with a name made up of a series of random letters and numbers.
<script>alert("Succ3ssful XSS")</script>
, into the "Contact Email" field. You should find that there is a client-side filter in place which prevents you from adding any special characters that aren't allowed in email addresses:No answer needed
No answer needed
No answer needed
<script>alert("Succ3ssful XSS")</script>
. After pasting in the payload, we need to select it, then URL encode it with the Ctrl + U
shortcut to make it safe to send. No answer needed
No answer needed
No answer needed
No answer needed
Burp Suite Community
Burp Suite Enterprise
Mobile
Proxy
Intruder
Sessions
Misc
Hotkeys
Aye
Forward
Ctrl+F
Response to this request
THM{NmNlZTliNGE1MWU1ZTQzMzgzNmFiNWVk}
Low
Subscription Required
False [Free]
Type
Walkthrough
Difficulty
Info
Tags
Burp Suite, Webapp, Tutorial, Toolkit