burpSuite Lab

[toggle_content title="Transcript"] Hi Lei Dregier here. I just want to show you the basic setup of how to get the burp suite up and running. Burp suite is something that you use a lot in the web application and pen testing world and it could be a little tricky to setup a few - they are not used to it. However you may find it both to be intuitive - so on the Kali Linux distro I want to go over - click on Kali Linux go down to web applications and then web applications proxy please go ahead and select the burp suite. Or you can just type in burp suite in the back prompt. So burp suite will come up and this is basically a two part setup here one inside the application and then two in your web browser. So we have got a little alert here there is a newer version available and that is okay. We are not going to update that now. I just want to share the basic setup - so we are going to go into the proxying options and basically look to see that this is isn't that setup. So listening on my interface AD specifically. This is a very important address under proxy options because you have to basically tell your web browser to point your traffic to yourself. So as long as this setting matches the one on your web browser and that is the one you set it up. Everything will be fine - you can do this locally or remote. Here we are going to locally - so next I am going to open up a web browser in this case we are going to use isuite so that it would be more than fine. We are going to go to the preferences and then we are going to go to the advanced tab network and down to proxying. Under network 'advanced network settings' click on the setting and use system proxy auto detect to manual we are going to set this up to and we are going to use port 880 these would be the settings of that - that you would want to use now keep in mind here that I am just telling you - I could use my IP address or the loop back address and then I will make sure that port 8080 matches - then there is plenty of ways to trick the end user into the setting up their proxy settings in this fashion. You could have stripped it you could do it as an update. you could do it through a group policy anyways is fair game but once you trick them to basically pointing you as a proxy. You get to capture all of that traffic – so go ahead and click enter and then go to some web page - I am going to go to www.leodregier.com and you noticed that it will kind of reason to hang out here. This is good because if it does freeze - then you can go back over to the burp suite and then you can see the inner set traffic noise that means that my host or the burp suite actually received the request and I can actually start evaluating that client traffic. So you can see a get request and the host the user agent it is coming from a Linux or web browser it is accepting the html application or xml the language is English. The encoding gzip or deflate etc. etc. and I am going to do ahead and forward that on to the next piece of traffic and then you can evaluate each one of these which is nice because if you wanted to - slowly analysis point - you can however you can also set it to just forward everything and then the end user wont experience the delay because notice here what the end user would see. If we go back over to here the page loaded it within itself. But end user may actually be you for example go to a large site like CNN - notice it freezes i go here forward and then CNN and then it stil hasn't loaded yet and then I can afford the next one and then CNN probably still hasn't loaded yet and then go to the next piece of traffic and the next one and the next one. So in that case the end user would definitely be impacted in the browsing experience. So you don't want to keep forwarding these pieces of information. Also keep a eye for anything and basically like for example I have a - these are flashed lights since we started the proxying request is going so you can see the summary here or you can keep going back and forth for it. Alright, that is basically how you set it up. Then you can start going into the detailed analysis of basically what is this doing. So just from the two sides that I went to so like leodregier.com it basically pulled a directory structure. I can pull my favorite icon. You can see that it is a WordPress site because wp_content you can analyze all sorts of parameters that headers and if you want to view this stuff and hexadecimal. You are certainly see the actual code there - so even something like we go back up to here to Twitter or anything that was reference on the site can also be here. Twitter there was some Twitter account code of learning you can go to the LinkedIn profiles and see if you can pull any of the LinkedIn names and he says my first and last name Leo Dregier or YouTube, go to the YouTube and it is the Code of Learning. So I am ultimately playing – user names or ID's or conventions that are related to this website. So it is a great way to kind of socially engineer the different conventions or points of presence or internet preference that a particular website is using and then you can go into other tools like spidering using this as a scanner. Setting it up as an intruder looking and setting different payloads they have a repeater that is built into this or sequencer or a comparer for different websites and things like that and some basic options like http or SSL this is an extremely, extremely, extremely powerful tool. We will probably cover that with maybe later videos but I just want to show you the basics of setting up the burp suite. So you can use this for sniffing web application. I would use this in web application pen testing. I would use this in session hijacking. I would use this in the man in the middle attacks. I would use this in web application vulnerability identification. Maybe even some exploits so that is the over view of the burp suite. Thank for watching and checkout all of the videos in this series, my name is Leo Dregier thanks for watching. [/toggle_content] The first simulation in the Web Applications module introduces burpSuite. This lab demonstrates how to use the burpSuite tool, a session scan within Kali Linux.  It’s a 2-part setup and configuration process – one part works and is set up on the web browser, while the other part is setup and works from inside the web application itself. When conducting penetration testing, implementing the correct configuration is essential to both performance of the test and obtaining accurate results. This Web Applications lab highlights that point.
Recommended Study Material
Learn on the go.
The app designed for the modern cyber security professional.
Get it on Google Play Get it on the App Store

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge



Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?