Burp Suite Web Application Testing by claudiodearaujo/izacenter
npx skills add https://github.com/claudiodearaujo/izacenter --skill 'Burp Suite Web Application Testing'使用 Burp Suite 的集成工具集执行全面的 Web 应用程序安全测试,包括 HTTP 流量拦截和修改、请求分析和重放、自动化漏洞扫描以及手动测试工作流。此技能通过基于代理的测试方法,系统地发现和利用 Web 应用程序漏洞。
| 功能 | Community | Professional |
|---|---|---|
| 代理 | ✓ | ✓ |
| 重放器 | ✓ | ✓ |
| 入侵者 | 有限 | 完整 |
| 扫描器 | ✗ | ✓ |
| 扩展 |
广告位招租
在这里展示您的产品或服务
触达数万 AI 开发者,精准高效
| ✓ |
| ✓ |
导航至集成浏览器以实现无缝代理集成:
控制捕获哪些请求:
Proxy > Intercept > Intercept is on/off toggle
当 ON 时:请求暂停以供审查/修改
当 OFF 时:请求通过,记录到历史记录
处理拦截的流量:
访问完整的流量日志:
在转发前更改请求参数:
| 目标 | 示例 | 目的 |
|---|---|---|
| 价格参数 | price=1 | 测试业务逻辑 |
| 用户 ID | userId=admin | 测试访问控制 |
| 数量值 | qty=-1 | 测试输入验证 |
| 隐藏字段 | isAdmin=true | 测试权限提升 |
POST /cart HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
productId=1&quantity=1&price=100
# 修改为:
productId=1&quantity=1&price=1
结果:商品以修改后的价格添加到购物车。
将测试聚焦于特定目标:
从 HTTP 历史记录中移除干扰:
准备请求进行手动测试:
高效测试不同的输入:
1. 在 Repeater 标签页查看请求
2. 修改参数值
3. 点击 Send 提交请求
4. 在右侧面板审查响应
5. 使用导航箭头查看请求历史记录
原始请求:
GET /product?productId=1 HTTP/1.1
测试 1: productId=2 → 有效产品响应
测试 2: productId=999 → 未找到响应
测试 3: productId=' → 错误/异常响应
测试 4: productId=1 OR 1=1 → SQL 注入测试
寻找漏洞的迹象:
启动漏洞扫描(仅限 Professional 版):
| 模式 | 描述 | 持续时间 |
|---|---|---|
| 轻量级 | 高级别概览 | ~15 分钟 |
| 快速 | 快速漏洞检查 | ~30 分钟 |
| 均衡 | 标准全面扫描 | ~1-2 小时 |
| 深度 | 彻底测试 | 数小时 |
跟踪扫描活动:
分析扫描发现:
设置自动化攻击:
| 类型 | 描述 | 用例 |
|---|---|---|
| 狙击手 | 单个位置,迭代载荷 | 模糊测试单个参数 |
| 攻城锤 | 所有位置使用相同载荷 | 凭据测试 |
| 干草叉 | 并行载荷迭代 | 用户名:密码对 |
| 集束炸弹 | 所有载荷组合 | 完全暴力破解 |
Positions Tab:
POST /login HTTP/1.1
...
username=§admin§&password=§password§
Payloads Tab:
Set 1: admin, user, test, guest
Set 2: password, 123456, admin, letmein
审查攻击输出:
| 操作 | Windows/Linux | macOS |
|---|---|---|
| 转发请求 | Ctrl+F | Cmd+F |
| 丢弃请求 | Ctrl+D | Cmd+D |
| 发送到 Repeater | Ctrl+R | Cmd+R |
| 发送到 Intruder | Ctrl+I | Cmd+I |
| 切换拦截 | Ctrl+T | Cmd+T |
# SQL 注入
' OR '1'='1
' OR '1'='1'--
1 UNION SELECT NULL--
# XSS
<script>alert(1)</script>
"><img src=x onerror=alert(1)>
javascript:alert(1)
# 路径遍历
../../../etc/passwd
..\..\..\..\windows\win.ini
# 命令注入
; ls -la
| cat /etc/passwd
`whoami`
场景:电子商务价格操纵
price=9999 参数price=1发现:服务器信任客户端提供的价格值。
场景:测试登录表单
username=admin' OR '1'='1'--发现:身份验证中存在 SQL 注入。
场景:基于错误的信息收集
productId 参数productId=1 更改为 productId=test发现:堆栈跟踪中泄露了 Apache Struts 2.5.12。
Weekly Installs
0
Repository
GitHub Stars
1
First Seen
Jan 1, 1970
Security Audits
Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay, automated vulnerability scanning, and manual testing workflows. This skill enables systematic discovery and exploitation of web application vulnerabilities through proxy-based testing methodology.
| Feature | Community | Professional |
|---|---|---|
| Proxy | ✓ | ✓ |
| Repeater | ✓ | ✓ |
| Intruder | Limited | Full |
| Scanner | ✗ | ✓ |
| Extensions | ✓ | ✓ |
Navigate to integrated browser for seamless proxy integration:
Control which requests are captured:
Proxy > Intercept > Intercept is on/off toggle
When ON: Requests pause for review/modification
When OFF: Requests pass through, logged to history
Process intercepted traffic:
Access complete traffic log:
Change request parameters before forwarding:
| Target | Example | Purpose |
|---|---|---|
| Price parameters | price=1 | Test business logic |
| User IDs | userId=admin | Test access control |
| Quantity values | qty=-1 | Test input validation |
| Hidden fields | isAdmin=true | Test privilege escalation |
POST /cart HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
productId=1&quantity=1&price=100
# Modify to:
productId=1&quantity=1&price=1
Result: Item added to cart at modified price.
Focus testing on specific target:
Remove noise from HTTP history:
Prepare request for manual testing:
Test different inputs efficiently:
1. View request in Repeater tab
2. Modify parameter values
3. Click Send to submit request
4. Review response in right panel
5. Use navigation arrows to review request history
Original Request:
GET /product?productId=1 HTTP/1.1
Test 1: productId=2 → Valid product response
Test 2: productId=999 → Not Found response
Test 3: productId=' → Error/exception response
Test 4: productId=1 OR 1=1 → SQL injection test
Look for indicators of vulnerabilities:
Initiate vulnerability scanning (Professional only):
| Mode | Description | Duration |
|---|---|---|
| Lightweight | High-level overview | ~15 minutes |
| Fast | Quick vulnerability check | ~30 minutes |
| Balanced | Standard comprehensive scan | ~1-2 hours |
| Deep | Thorough testing | Several hours |
Track scanning activity:
Analyze scan findings:
Set up automated attack:
| Type | Description | Use Case |
|---|---|---|
| Sniper | Single position, iterate payloads | Fuzzing one parameter |
| Battering ram | Same payload all positions | Credential testing |
| Pitchfork | Parallel payload iteration | Username:password pairs |
| Cluster bomb | All payload combinations | Full brute force |
Positions Tab:
POST /login HTTP/1.1
...
username=§admin§&password=§password§
Payloads Tab:
Set 1: admin, user, test, guest
Set 2: password, 123456, admin, letmein
Review attack output:
| Action | Windows/Linux | macOS |
|---|---|---|
| Forward request | Ctrl+F | Cmd+F |
| Drop request | Ctrl+D | Cmd+D |
| Send to Repeater | Ctrl+R | Cmd+R |
| Send to Intruder | Ctrl+I | Cmd+I |
| Toggle intercept | Ctrl+T | Cmd+T |
# SQL Injection
' OR '1'='1
' OR '1'='1'--
1 UNION SELECT NULL--
# XSS
<script>alert(1)</script>
"><img src=x onerror=alert(1)>
javascript:alert(1)
# Path Traversal
../../../etc/passwd
..\..\..\..\windows\win.ini
# Command Injection
; ls -la
| cat /etc/passwd
`whoami`
Scenario : E-commerce price manipulation
price=9999 parameter in POST bodyprice=1Finding : Server trusts client-provided price values.
Scenario : Testing login form
username=admin' OR '1'='1'--Finding : SQL injection in authentication.
Scenario : Error-based information gathering
productId parameterproductId=1 to productId=testFinding : Apache Struts 2.5.12 disclosed in stack trace.
Weekly Installs
0
Repository
GitHub Stars
1
First Seen
Jan 1, 1970
Security Audits
xdrop 文件传输脚本:Bun 环境下安全上传下载工具,支持加密分享
24,700 周安装