BSCE - DrAlzahraniProjects/csusb_fall2024_cse6550_team2 GitHub Wiki

  1. Installation
  2. Configuration
  3. Implementation
  4. Usage
  5. Troubleshooting

1. Installation

To install Burp Suite Community Edition, follow these steps:

Download

Visit the Burp Suite Downloads page. Choose the appropriate version for your operating system (Windows, macOS, or Linux).

Installation Steps

For Windows:

  1. Download the installer.
  2. Run the installer and follow the on-screen prompts.
  3. Launch Burp Suite from the Start menu.

2. Configuration

After installation, you need to configure Burp Suite to effectively use its features. The process varies depending on the browser you’re using; in this example, I’ll use Firefox. However, you can refer to the Burp Suite documentation here on how to configure other browsers.

  • Launch Burp Suite.

burp1

  • Select "Use Burp Defaults" and click "Start Burp" to access the main dashboard with tabs

burp2

  • Go to the "Proxy" tab.

burp3

  • Ensure the proxy listener is enabled on the default port (usually 8080) in "Proxy settings".

burp4

  • Configure your browser to use Burp as a proxy: For firefox, go to browser's network settings, set the HTTP proxy to 127.0.0.1 and port 8080.

burp6

SSL Certificate Installation

To intercept HTTPS traffic, you need to install the Burp SSL certificate: bash

Screenshot 2024-10-14 at 00-45-21 Burp Suite Community Edition

  • Follow the prompts to download and install the Burp CA certificate.

burp7

  • Search for certificate in the search tab.

burp8

  • Move to the Authorities tab, click Import.

burp9

3. Implementation

Burp Suite provides various features for web application testing. Here are some essential functionalities:

Intercepting Requests

  • Intercepting requests in Burp Suite allows you to examine, modify, and replay HTTP(s) traffic between your computer and the target web application. This is a fundamental feature for web application security testing. Ensure the Proxy is active and your browser is configured and intercept on.

burp5

  • Use the browser to navigate to a web application.

burp10

  • Burp will intercept the requests, allowing you to analyze and modify them before they reach the server. In the Proxy tab, click "Forward" to pass through requests, and use "HTTP history" to monitor all HTTP traffic.

burp11

  • Click Forward to allow the requests to pass through while monitoring the traffic and select http history option

burp12

4. Usage

Using Repeater for testing websocket vulnerabilities

  • Selected WebSocket request to test for vulnerabilities in a WebSocket request, send this to repeater and view the request in the repeater tab.

burp13

  • The request is attempting to upgrade the connection to a WebSocket. We focus on testing how the server responds to unexpected modifications in Host, Connection, Sec-WebSocket-Key, Sec-WebSocket-Version and Origin

burp14

  • In Repeater, modify headers.

    Origin Header: Changing this header helps test if the server restricts connections based on the origin, enhancing security against CSWSH. Click on 'Send' for any kind of modification or to get a response from server. Response from the server will be displayed at the right side

burp16

  • Original request response.

burp15

Spidering a website

burp17

  • Navigate to the Target tab.
  • Right-click on the target site and select Spider this host.
  • Burp will start crawling the website to discover additional endpoints.

5. Troubleshooting

  1. Unable to Launch Burp Suite

    • Verify Java is installed.
  2. Proxy Issues:

    • Ensure your browser is correctly configured to route traffic through Burp Suite's proxy.
  3. SSL/TLS Certificate Error

    • If you encounter SSL/TLS certificate errors, ensure Burp Suite's certificate is installed in your browser. Go to Proxy > Options > Import / export CA Certificate, and follow the instructions for your browser.
  4. High CPU Usage

    • Reduce threads in Burp Suite settings: Go to Settings > Project Options > Connections > Reduce threads.
⚠️ **GitHub.com Fallback** ⚠️