Original Request:
GET /product?productId=1 HTTP/1.1
Test 1: productId=2 → Valid product response
Test 2: productId=999 → Not Found response
Test 3: productId=' → Error/exception response
Test 4: productId=1 OR 1=1 → SQL injection test
分析响应
寻找漏洞的迹象:
显示堆栈跟踪的错误消息
框架/版本信息泄露
表明逻辑缺陷的不同响应长度
暗示盲注的时间差异
响应中出现意外数据
阶段5:运行自动化扫描
启动新扫描
启动漏洞扫描(仅限Professional版):
转到 Dashboard 标签页
点击 New scan
在 URLs to scan 字段输入目标URL
配置扫描设置
扫描配置选项
模式
描述
持续时间
轻量级
高级别概览
~15分钟
快速
快速漏洞检查
~30分钟
均衡
标准全面扫描
~1-2小时
深度
彻底测试
数小时
监控扫描进度
跟踪扫描活动:
在 Dashboard 中查看任务状态
实时观察 Target > Site map 更新
检查 Issues 标签页以发现漏洞
审查已识别的问题
分析扫描结果:
在Dashboard中选择扫描任务
转到 Issues 标签页
点击问题以查看:
Advisory : 描述和修复建议
Request : 触发漏洞的HTTP请求
Response : 显示漏洞的服务器响应
阶段6:Intruder攻击
配置Intruder
设置自动化攻击:
发送请求到Intruder(右键点击 > Send to Intruder)
转到 Intruder 标签页
使用§标记定义有效载荷位置
选择攻击类型
攻击类型
类型
描述
用例
Sniper
单个位置,迭代有效载荷
模糊测试单个参数
Battering ram
所有位置使用相同有效载荷
凭证测试
Pitchfork
并行有效载荷迭代
用户名:密码对
Cluster bomb
所有有效载荷组合
完全暴力破解
配置有效载荷
Positions Tab:
POST /login HTTP/1.1
...
username=§admin§&password=§password§
Payloads Tab:
Set 1: admin, user, test, guest
Set 2: password, 123456, admin, letmein
分析结果
审查攻击输出:
按响应长度排序以发现异常
按状态码过滤以查找成功尝试
使用grep搜索特定字符串
导出结果以供记录
快速参考
键盘快捷键
操作
Windows/Linux
macOS
Forward request
Ctrl+F
Cmd+F
Drop request
Ctrl+D
Cmd+D
Send to Repeater
Ctrl+R
Cmd+R
Send to Intruder
Ctrl+I
Cmd+I
Toggle intercept
Ctrl+T
Cmd+T
常见测试有效载荷
# SQL注入
' OR '1'='1
' OR '1'='1'--
1 UNION SELECT NULL--
# XSS
<script>alert(1)</script>
"><img src=x onerror=alert(1)>
javascript:alert(1)
# 路径遍历
../../../etc/passwd
..\..\..\..\windows\win.ini
# 命令注入
; ls -la
| cat /etc/passwd
`whoami`
Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic interception and modification, request analysis and replay, automated vulnerability scanning, and manual testing workflows. This skill enables systematic discovery and exploitation of web application vulnerabilities through proxy-based testing methodology.
Inputs / Prerequisites
Required Tools
Burp Suite Community or Professional Edition installed
Burp's embedded browser or configured external browser
Target web application URL
Valid credentials for authenticated testing (if applicable)
Environment Setup
Burp Suite launched with temporary or named project
Proxy listener active on 127.0.0.1:8080 (default)
Browser configured to use Burp proxy (or use Burp's browser)
Continue forwarding subsequent requests until page loads
View HTTP History
Access complete traffic log:
Go to Proxy > HTTP history tab
Click any entry to view full request/response
Sort by clicking column headers (# for chronological order)
Use filters to focus on relevant traffic
Phase 2: Modifying Requests
Intercept and Modify
Change request parameters before forwarding:
Enable interception: Intercept on
Trigger target request in browser
Locate parameter to modify in intercepted request
Edit value directly in request editor
Click Forward to send modified request
Common Modification Targets
Target
Example
Purpose
Price parameters
price=1
Test business logic
User IDs
userId=admin
Test access control
Quantity values
qty=-1
Test input validation
Hidden fields
isAdmin=true
Test privilege escalation
Example: Price Manipulation
POST /cart HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
productId=1&quantity=1&price=100
# Modify to:
productId=1&quantity=1&price=1
Result: Item added to cart at modified price.
Phase 3: Setting Target Scope
Define Scope
Focus testing on specific target:
Go to Target > Site map
Right-click target host in left panel
Select Add to scope
When prompted, click Yes to exclude out-of-scope traffic
Filter by Scope
Remove noise from HTTP history:
Click display filter above HTTP history
Select Show only in-scope items
History now shows only target site traffic
Scope Benefits
Reduces clutter from third-party requests
Prevents accidental testing of out-of-scope sites
Improves scanning efficiency
Creates cleaner reports
Phase 4: Using Burp Repeater
Send Request to Repeater
Prepare request for manual testing:
Identify interesting request in HTTP history
Right-click request and select Send to Repeater
Go to Repeater tab to access request
Modify and Resend
Test different inputs efficiently:
1. View request in Repeater tab
2. Modify parameter values
3. Click Send to submit request
4. Review response in right panel
5. Use navigation arrows to review request history
Repeater Testing Workflow
Original Request:
GET /product?productId=1 HTTP/1.1
Test 1: productId=2 → Valid product response
Test 2: productId=999 → Not Found response
Test 3: productId=' → Error/exception response
Test 4: productId=1 OR 1=1 → SQL injection test