30 January 2007 | 43,236 views

Burp Proxy & Burp Suite – Attacking Web Applications

Cybertroopers storming your ship?

I love the Burp Suite, I really do. It’s pretty much my favourite local proxy program and my favourite suite of tools for security testing web applications (especially the session investigation and manipulation parts).

Another great thing is it’s cross platform, so you don’t have to learn different tools for Windows and Linux.

Burp Proxy

Basically Burp suite is an integrated platform for attacking web applications. It contains all of the burp tools (proxy, spider, intruder and repeater) with numerous interfaces between them designed to facilitate and speed up the process of attacking a web application. All plugins share the same robust framework for handling HTTP requests, authentication, downstream proxies, logging, alerting and extensibility.

Burp suite allows an attacker to combine manual and automated techniques to enumerate, analyse, attack and exploit web applications. The various burp tools work together effectively to share information and allow findings identified within one tool to form the basis of an attack using another.

Key features unique to burp suite include:

  • Ability to “passively” spider an application in a non-intrusive manner, with all requests originating from the user’s browser.
  • One-click transfer of interesting requests between plugins, e.g. from the proxy request history, or a web page form enumerated with burp spider.
  • Extensibility via the IBurpExtender interface, which allows third-party code to extend the functionality of burp suite. Data processed by one plugin can be used in arbitrary ways to affect the behaviour and results of other plugins.
  • Centrally configured settings for downstream proxies, web and proxy authentication, and logging.
  • Plugins can run in a single tabbed window, or be detached in individual windows.
  • All plugin and suite configuration is optionally persistent across program loads.
  • Runs in both Linux and Windows.

I’ll try and do some tutorials for Burp later on and perhaps I’ll focus a bit more on Burp Proxy alone, as it’s an extremely powerful tool.

Burp suite is a Java application, and runs on any platform for which a Java Runtime Environment is available. It requires version 1.4 or later. The JRE can be obtained for free from Sun.

You can download Burp Suite below, both archives contain the same files, which will run under both Windows and Linux.



Recent in Hacking Tools:
- RWMC – Retrieve Windows Credentials With PowerShell
- MITMf – Man-In-The-Middle Attack Framework
- LaZagne – Password Recovery Tool For Windows & Linux

Related Posts:
- Paros Proxy 3.2.10 Released – MITM HTTP and HTTPS Proxy
- Paros Proxy 3.2.11 Released – MITM HTTP and HTTPS Proxy
- Burp Suite v1.3 Released – Integrated Platform For Attacking Web Applications

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,954,933 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,334,746 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 666,153 views

Advertise on Darknet

5 Responses to “Burp Proxy & Burp Suite – Attacking Web Applications”