Vulnerability Analysis Blog

Burp Suite for Web Application Penetration Testing

Overview

Burp Suite is the industry-standard tool for web application penetration testing. Where Nmap maps the network layer and Tenable identifies known CVEs, Burp Suite goes deeper into the application layer — intercepting HTTP/S traffic, manipulating requests, fuzzing parameters, and identifying vulnerabilities that automated scanners miss. This guide walks through how I use Burp Suite to find and validate web application vulnerabilities, with direct ties to the OWASP Top 10 categories covered in my earlier post.


Step 1: Environment Setup & Proxy Configuration

Before testing, configure Burp Suite as an intercepting proxy between your browser and the target:

Setup Steps:

  1. Launch Burp Suite and navigate to Proxy > Options
  2. Confirm the proxy listener is running on 127.0.0.1:8080
  3. In your browser, set the HTTP/HTTPS proxy to 127.0.0.1:8080
  4. Navigate to http://burpsuite (or http://burp) in your browser
  5. Download and install the Burp CA certificate in your browser’s certificate store
  6. Enable Intercept under Proxy > Intercept to begin capturing traffic

Recommended Browser Setup:


Step 2: Traffic Interception & Manual Analysis

With the proxy running, browse the target application to build a complete traffic map:

What to Examine in Each Request:

Key Areas in Burp:


Step 3: Scanning with Burp Scanner (Pro)

Burp Suite Pro includes an automated crawler and vulnerability scanner:

Burp Scanner Detects:

Note: Burp Community edition does not include the automated scanner. Manual testing techniques in the following steps apply to both Community and Pro.


Step 4: Manual Vulnerability Testing

Automated scanners miss business logic flaws, authorization issues, and chained vulnerabilities. Manual testing covers what automation cannot:

SQL Injection (A03:2021)

Inject SQL syntax into input fields, URL parameters, headers, and cookies:

# Basic detection payloads
'
''
' OR '1'='1
' OR 1=1--
' UNION SELECT NULL--

# Send to Repeater, modify, and observe response differences

Cross-Site Scripting (A03:2021)

Test all user-controlled input that appears in HTML responses:

# Basic XSS payloads
<script>alert(1)</script>
"><script>alert(1)</script>
<img src=x onerror=alert(1)>
javascript:alert(1)

Broken Access Control (A01:2021)

Test whether authorization is properly enforced:

# Example: Change the user ID in a request and see if another user's data is returned
GET /api/user/1001/profile → change to /api/user/1002/profile

Authentication Failures (A07:2021)

Test login mechanisms and session management:

# Intruder attack types for credential testing
Sniper — single payload position (username or password wordlist)
Cluster bomb — multiple payload sets (username + password combo lists)

SSRF (A10:2021)

Look for parameters that accept URLs or IP addresses as input:

# Test for internal service access
?url=http://127.0.0.1/admin
?url=http://169.254.169.254/latest/meta-data/   # AWS metadata endpoint
?redirect=http://internal-server.local/

Step 5: Using Burp Intruder for Fuzzing

Intruder automates payload injection across parameterized requests:

  1. Capture a request in Proxy and send it to Intruder (Ctrl+I)
  2. Highlight payload positions with § markers
  3. Select attack type and load a payload wordlist
  4. Launch attack and analyze responses by status code, length, and content

Useful Intruder Payloads:

Note: Burp Community throttles Intruder speed. Use ffuf or feroxbuster for large-scale fuzzing and reserve Intruder for targeted manual attacks.


Step 6: Burp Repeater for Manual Exploitation

Repeater is the most-used Burp tool for hands-on vulnerability validation:

Common Repeater Workflows:


Step 7: Reporting Findings

Document each finding with enough detail to reproduce and remediate:

Finding Documentation Template:

Field Content
Title Reflected XSS in Search Parameter
OWASP Category A03:2021 – Injection
Severity High
Endpoint GET /search?q=<payload>
Proof of Concept Request/response screenshots
Impact Session hijacking, credential theft
Remediation Input sanitization, Content-Security-Policy header

Integrating Burp Suite Into the Broader Workflow

Burp Suite is the web application layer of your full testing pipeline:


Tools & Resources


Important Ethical Considerations


Final Thoughts

Burp Suite bridges the gap between network-level vulnerability data and real application risk. Tenable will tell you a web server is running an outdated framework — Burp Suite tells you whether that framework is actually exploitable through the application, and where the business logic breaks down in ways no automated scanner would catch. Combined with Nmap for reconnaissance and Metasploit for post-exploitation validation, Burp Suite completes the full attack chain assessment for any web-facing target.

online