It is very powerful tool of kali Linux that is used for website hacking. It works in graphical user interface mode and use to scan, brute force any website. It is a complete framework for website hacking. We can do all works related to website hacking in burp suite. So a hacker must learn it. It is pre-installed in all version of kali Linux, so we can use it directly.
Burp suite is two editions, first is community edition which is free to use and second is professional edition which is paid. Professional edition has some advance options but community edition has important options and mostly people use community edition. In our post we will discuss about community edition. To use we need CA certificate for community edition. To download CA certificate open your burp suite. Click on (proxy) and then click on (Intercept is off) to (On) the (Intercept). Then open your Firefox browser and search here (https://burp) and click on (CA certificate) to download it. Then to configure CA certificate click on three line and click on (options) and search here (certificates) and click on (view certificates) and click on (import) then select your (CA certificates) and click (open) . Then click the option (trust the ca to identify websites) and click (ok) and then (ok). Certificate will configure. If you want to use the proxy then you must configure same proxy in your burp suite and browser on same port. Then you can use the burp suite easily for website hacking.
Now, when you will open the burp suite then it shows different (options) or (windows), like (dashboard), (target), (proxy), (intruder), (repeater), (sequencer), (decoder) etc. to perform different function.
1) DASHBOARD
(Dashboard) have further (Windows). (Tasks) windows show different running on target website, stopped tasks, finished tasks, user tasks, scans, intruder attack. (Event log) window show the error in target website. (Issue activity) show vulnerabilities in target website. Bellow the (issue activity) window a window show details of specific vulnerability when we click on (issue activity) window.
Dashboard in burp suite
2) TARGET
(Target) option of burp suite is very important. It show the details of our target website and its sub-urls. To set a target website to scan and hack click on (proxy) and click (intercept is off) to on the (intercept) and open your target website in your configured browser and it will show in (Target) window, or option. In target option (Site map) will show different (links) with folder related to our target website. (Contents) will show you the (host), (method), (link or url) other things related to target. Window bellow (Contents) will show the (request) and (response) of target website. (Issues) window will show the (vulnerabilities) and window bellow issues will show you the details of specific vulnerability.
Target tab in burp suite
3) PROXY
(Proxy) tab is also a very important tab of burp suit. It is used to capture, forward and drop any request sent to any target. We can do changes in request also send to server. Click on (intercept is off) to on it and open your target website in your configured browser. Any request which you will send to your website will capture in proxy tab. Now you can changes make in requests. Then if you want to send request from (burp suit) to (server) then click on (forward) and if you want to cancel click on (DROP) and (reload) your website in browser to (send or drop) it. Here you can perform some other tasks as (login authentication bypass), (scanning) etc. also click on (Action) and you will see different options like (scan), (Do passive scan), (Do active scan), (Send to intruder) etc. and you can try any these options during web hacking. By clicking on (HTTP history) you can see requests of http, links and their codes. You can see parameters, IPs, Time etc. about your target. In (options) tab in proxy you can (set) and (edit) your proxy, your hosts, ports etc.
Proxy tab in burp suite
4) INTRUDER
(INTRUDER) tab or option is also a very important tab of burp suit and it is used to perform different (attacks) on our target website. We can try payloads, brute force attack etc. in this tab. You can perform all types of attacks in this tab like XSS attacks, brute force attack etc. I will discuss separately these attacks in burp suit.
Intruder tab in burp suite
5) REPEATER
(Repeater) tab is important tab of burp suit that is used to (send) changed (request) and show (response) of website on these requests. Go to (proxy) tab and rite click on your captured request and click on (send to repeater). Then go to (repeater) tab make change in your request and click on (send) and (response) will show. You can (search) also (specific key words) in your burp suit in (requests) and (response) in repeater tab. You can see (request) and response in (coded), (programmed) or in other format also by clicking on different options in (request) and (responses).
Repeater tab of burp suite
6) SEQUENCER:
It is used to find (token packets) that are changing during different requests and responses. It will understand a token and will give its (sequence) and we can (perform) attack on specific token. This tab has further three options first is (live capture). Go to you (target) tab. (right click) on your (capture) request) and click on (send to sequencer) and your request in (live capture) option are tab in sequencer. Then you can select the location of your token shown in figure. You can also set number of (threads), (timeout), (length of your token). Then click on (start live capture) and capturing of your specific token will start in (new window) as shown in figure. Then click on (analyze now) to see the sequence of your specific (token). In (manual load) of (sequencer) you can set your (own token sequence).
7) DECODER:
This tab is one of the most important tab of burp suit and every black hat hacker and white hat hacker uses it for website hacking. This tab is used (encode) and (decode) any text or request of website during. Encoding mean changing a text request from (readable) to (unreadable) by using specific rules. We can encode and decode our request in different form like base64, ASCII, hash etc. We can create hash values of specific words also decoder tab.
Decoder tab in burp suite
This was small introduction of different tabs of burp suit. You can see more detail on YouTube or google about these tabs to learn deeply.
Now I will discuss some attacks on website by burp suit.
1) BRUTE FORCE ATTACK BY BURP SUIT:
We have discussed about brute force attack in a Separate post deeply but in case of advance website hacking burp suit is very effective for brute force attack on a login page of website.
To do this attack open the login page of website then and type here any (username) and (password). Then open your burp suit, go to (proxy) type and click on (intercept is off) to (on) it. Then go to your website login page and click on (login) after entering any (username) and password. So, your request of login will capture in your burp suit.
Then (right click) on your capture request and click on (send to intruder. Then (off) intercept. In (position) tab your request will be send. Here click on (clear) from side to (clear all parameters) selection.
Then select your wrong (username) and click on (ADD), then select your wrong (password) and click on (ADD) then select your type as (cluster bomb). The select the (payload) tab. Then select payload set as (1) and (select) payload type as (simple list) then click on (load) and select your (username list).
Then select the (payload) set as (2) and click on (load) second box and select your (password file). Then select the (resource pool) and (tick or click) and (create new resource). Then click (maximum concurrent request) and type request numbers is (5). Then (click) the (delay between requests) and type time as (5) for delay. Then come back to (position) type and click on (start attack) and attack will start in a (new window) and (username) and (password) will found with (ticks) or you can see it in (requests). So, best of luck for brute force attack on burp suit.
Brute force attack in burp suite
2) CROSS SITE SCRIPTING (XSS):
It is a vulnerability finding attack in which we can find XSS vulnerability in website. It is an attack in which we inject a (script) of java script in a website on any place and it is stored in website then it mean website is vulnerable to XSS and we can control it by exploiting vulnerability. We can do this by burp suit. To do this attack enter a code (<script>alert(1)</script>) on any place of website like in place of (username) or (password) and error is generated or it is accepted by website is response is positive that is means website have XSS vulnerability send your (request) to (repeater) is burp suit by (right clicking) it then run or type this script on any place of your request as at the place of (password) click on send and (response) will show. Analyze to response and find XSS. So, best of luck for XSS attack in burp suit.
3) LOGIN AUTHENTICATION BYPASS ATTACK:
It is an attack which not common but very dangerous. It can be done only (login) page of websites only use OR operator functioning. We do this to (login) to someone’s account on a website you will be confuse about or operator.
It means if you know only (username) or (password) only then you can (login) to the website using one of these either (username) or (password). It means only one things will be require, to login to someone’s account on website. To do this attack open your login page to (login) to your account on website having OR function.
Type (username), (password) and other details required to login, (and on the intercept) in (proxy) tab of burp suit and click on your account. Your request will capture in burp suit. Then click on (Actions) and click on (Do intercept) and click on (response to this request) and click on (forward).
Then change the (user ID) in burp suit and click on (forward) and you will login to someone’s account on this site. It was attack on account that depends upon (USER ID). Other attacks can be done also but OR function should be enable for this attack on (login) page of (users) on website. So, best for this attack in burp suit.
So, it was all about burp suit (tabs) and (attacks). Burp suit is deep software to learn and not so easy to run. For more deep study you can take help from YouTube or you can take help on different websites. So, best of luck for burp suit.