Master Burp Suite with These Essential Shortcuts

What is Burp suite ?

Burp or Burp Suite is a set of tools used for penetration testing of web applications. It is developed by the company named Portswigger, which is also the alias of its founder Dafydd Stuttard. BurpSuite aims to be an all in one set of tools and its capabilities can be enhanced by installing add-ons that are called BApps. It is the most popular tool among professional web app security researchers and bug bounty hunters.

Burp suite pro for free

You can get burp suite professional for free by clicking on this link it will redirect you to a github repo follow this steps and this method works both for windows and linux.

Burp Suite Navigational Hotkeys

Editor Encoding / Decoding Hotkey

Global Hotkey

Editors Hotkeys Hotkey

Tool Specific Hotkeys

Burp Collaborator

The collaborator enables the
penetration tester to listen for call-
backs from vulnerable scripts and
services via auto-generation of unique
DNS names and works on the following
protocols:

DNS

HTTP & HTTPS

SMTP & SMTPS

Use the Burp extension Taborator to
make Burp Collaborator easier to use
on-the-fly.

Burp Suite extensions

Users can contribute with extensions to aid in the discovery of vulnerabilities. Be aware of false- positives and use your pentesting capabilities to ensure you fully explore the findings.

Param Miner

Allows high-performance identifying of unlinked parameters. Check for unlinked GET and Headers, and unlinked POST when applicable.

Backslash Powered Scanner

Will give alerts on interesting transformations of data or other interesting things. Often, it will be false- positives, but it allows the penetration tester to focus on potential vulnerabilities.
Software Vulnerability scanner
Checks software version numbers against vulnhub.com for vulnerabilities.

(adsbygoogle = window.adsbygoogle || []).push({});HTTP Request Smuggler

This is an extension for Burp Suite designed to help you launch HTTP Request Smuggling attacks.

Active scan++

Allows us to find more vulnerabilities in terms of suspicious input transformation, XML input handling, host header attacks and more.

Retire.js

Finds outdated JavaScript and links to the relevant CVE's for your investigations.

Authorization and Authentication

SAML-Raider

Useful to inspect SAML messages, edit and re-sign them.

JSON Web Tokens

Lets you decode and manipulate JSON web tokens on the fly, check their validity and automate common attacks.

Autorize

Detect if scripts are accessible via different roles or unauthenticated in the web-application.

Burp Suite Utilities

These extensions are helpful utilities to a variety of different situations and help bring the penetration tester to their full potential.

Logger++

Use this plugin to log and monitor your attacks from e.g., scanner and more. Sort by status-code and do an extra inspection on server 500 errors. When you have done inspections, clear the logs.

Turbo Intruder

Python scriptable interface where one can achieve custom functionality and very high speeds of HTTP requests through http pipelining.

Taborator

Quickly add and monitor Burp collaborator interactions.

Burp Suite REST API

The REST API can be enabled in user options. It will by default be enabled on http://127.0.0.1:1337/. It supports interaction via web-application too, not just CLI. Below is a list of endpoints via their URL and the respective CURL command to use them. The API can be especially useful when you need to send a consolidated list of URLs from a different tool to the scan engine, or perhaps use Burp Suite in headless mode. To open Burp Suite in headless mode run it with the following arguments:

java -jar -Xmx4g -Djava.awt.headless=true/path/to/burp.jar

Get a list of defined issues:

http://localhost:1337/knowledge_base/issue_definitions curl -vgw "\n" -X GET 'http://127.0.0.1:1337/v0.1/knowledge_base/issue_definitions'

Scan a URL with the Active Scanner (vulnerability scanner):

http://localhost:1337/scan curl -vgw "\n" -X POST 'http://127.0.0.1:1337/v0.1/scan' -d '{"urls":["http://target.tgt/scanTarget1","http://target.tgt/scanTarget2"]}'

Check the status and progress of a given scan:

http://localhost:1337/scan/task_id curl -vgw "\n" -X GET 'http://127.0.0.1:1337/v0.1/scan/mytask_identifier'

Scroll to Top
www.thecyberblogs.com