SQL Injection
This is when you type computer code into a normal search box. If the website doesn't block it, your code sneaks into their database and can steal all the passwords.
The standard for web application security.
Master the intersection of manual and automated techniques for securing web applications.
Burp Suite is a program that acts like a middleman. It catches secret messages between your computer and a website, letting you read, change, and test them to see if the website is safe.
Normally, your web browser talks directly to a website. But with Burp Suite turned on, everything stops in the middle first.
Sends a request (like "Log me in")
The Middleman. Catches the request so you can change it.
Receives the (maybe changed) request
When you click a button on a website, you don't see the real message being sent. It happens invisibly. Burp Suite makes the invisible visible.
This hidden message is called an HTTP Request. It is just plain text with rules. If we can change this text before the website sees it, we might be able to trick the website.
How do security testers use this? Let's pretend you are buying a TV that costs $100. Here is how you test if the shop is safe.
You click "Buy TV for $100" on the website. Your browser tries to send this price to the server.
Burp Suite stops the message. You look at the code and see price=100. You delete
the "100" and type "1".
You tell Burp Suite to send the changed message to the website. If the website is built badly, it will say "Success! You bought a TV for $1." This is called a vulnerability.
Security testers use Burp Suite to find three main types of huge mistakes in websites.
This is when you type computer code into a normal search box. If the website doesn't block it, your code sneaks into their database and can steal all the passwords.
This happens when you hide an evil script in a comment or a message. When another user reads your comment, the hidden script runs on their computer and steals their login.
This is when the door to the website is locked, but the hinges are broken. Testers use Burp to see if they can bypass the password screen entirely by changing hidden values.
Burp Suite isn't just one tool; it is a whole box of tools. Here are the four you will use the most.
The Pause Button. This stops web traffic so you can read it and edit it before letting it go.
The Do-Over. It lets you take one single message and send it over and over again, tweaking one small word each time to see what happens.
The Guesser. You give it a list of 10,000 common passwords, and it fires them at the website super fast to see if any of them work.
The Robot. This is an automatic tool that clicks every link on a website by itself and tells you if it finds obvious holes.
You don't need to be a master hacker to start looking around. You can start today for free.
Using Burp Suite on a website without asking the owner is like testing the locks on your neighbor's house. It is illegal.
Burp Suite has a setting called Target Scope. You type the exact name of the
website you are allowed to test (like test-site.com).
If you set the Scope, Burp will ignore traffic from other websites, so you do not accidentally hack Facebook or Google while working.
When you open Burp Suite, the first thing you see is the Dashboard. It shows you the health of your testing session.
Websites do not always send plain text. Sometimes they scramble the data so it safely travels across the internet.
Burp's Decoder tool works like a magic ring. You paste in the scrambled gibberish, and tell it to unscramble it into normal words.
Imagine looking at two huge blocks of code. They look identical, but one logs you in as a regular user, and the other logs you in as an Admin. How do you find the tiny difference?
Use the Comparer.
Just like your phone has an App Store to add new features, Burp Suite has the BApp Store. These are mini-tools created by other hackers to make Burp even better.
A tool that specifically looks at login tokens and tries to break them.
Looks at the website's code and tells you if they are using old, dangerous software.
Helps you test if User A can secretly see User B's private messages.
When you first start using Burp as a middleman, secure websites (HTTPS) will panic and show a big red warning: "Your connection is not private."
This is because the website knows there is a middleman! To fix this, you have to tell your browser: "It's okay, I put the middleman there on purpose."
You do this by downloading Burp's "CA Certificate" and installing it in your browser settings. Once you do that, the errors go away!
Burp Suite isn't just for laptops. Phone apps talk to websites all the time, completely invisibly.
You can connect your iPhone or Android to the same Wi-Fi as your computer, and tell your phone to send all its data through Burp Suite.
This lets you catch secrets that mobile games or shopping apps are trying to hide from you!
When reading about Burp Suite, you will hear weird words. Here is what they actually mean.
Follow this order every time you test a new website.
Master more skills with other tutorials from the Web Security series.