Basics of Burp Suite for identifying vulnerabilities and verifying attack vectors for web-based applications Part-1


 This tutorial is only for Educational purposes. Please don’t use these kind of attacks for unethical purposes.


Burp or Burp Suite is an integrated platform for performing security testing of web applications. Information security professionals use Burp to identify vulnerabilities and verify attack vectors for web-based applications. The framework is written in Java and developed by PortSwigger Security. You can download the free version using the link below .


It was developed to provide a comprehensive solution for a for web application security checks and it’s a very powerful and useful tool. In addition to basic functionalities, such as proxy server, scanner and intruder, the tool also contains more advanced options such as a spider, a repeater, a decoder, a comparer, an extender and a sequencer. Lets get stated..  Source: Download BurpSuite Free Edition


Simply we can say Burpsuite is an interception web proxy used by penetration testers to capture and analyze each request and response to and from the targeted web application.To do this the penetration tester must configure the internet browser to route traffic through the proxy which then act as a sort of man in the middle.

First you should download and install the BupSuite.


For this tutorial Im gonna use Temp project. Simply click next.


We are gonna use burp defaults. Select it and hit START BURP!!!

If it looks like this then you are good to go…


First we have to check the proxy settings and change our web browser’s proxy settings according to that then only burp can act as man in the middle and capture and analyse our requests and responses.


Check the interface. The IP Address and the port number. Then have to configure our web browser’s proxy settings. First I’m gonna explain for Google Chrome. Go to your browser settings and simply search for Proxy settings u can see how I’ve done that… Then open proxy settings.


In the Internet properties window go to LAN settings…


Then configure the Proxy Server… By giving the relevant IP Address and the Port number and then hit the OK button.


Restart BurpSuite… And go to Proxy–>Intercept. You Can see the Intercept if off… Turn it ON!!!


Go to the Web Browser and use it to view the targeted website… U’ll be able to see that burp has captured the request…



This tutorial is only for Educational purposes. Please don’t use these kind of attacks for unethical purposes.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: