(BurpSuiteMastery) LabManualV3 1514182492549
(BurpSuiteMastery) LabManualV3 1514182492549
(BurpSuiteMastery) LabManualV3 1514182492549
MASTERY
LA B MANUAL
Contents
About 2
Copyright 2
Disclaimer 2
Prerequisites 3
Exercise 3
Prerequisites 3
Goals 3
Steps 3
Installation / Setup 4
Exercise 4
Prerequisites 4
Goals 4
Steps 4
Configuration 5
Exercise 5
Prerequisites 5
Goals 5
Steps 5
Burp Basics 6
Exercise 6
Prerequisites 6
Goals 6
Steps 6
Tools – I 7
Exercise 7
Prerequisites 7
Goals 7
Steps 7
Tools – II 10
Exercise 10
Prerequisites 10
Goals 10
Steps 10
Advance usage of Burp 12
Exercise 12
Prerequisites 12
Goals 12
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 2
About
Peritus Information Security Services Private Limited is an Information Security Company located in
India which provides security consulting services and also specializes in providing information security
trainings all over the world. Contact: [email protected]
Copyright
Peritus Information Security Services Private Limited owns all rights, title and interest in these materials
and such materials are protected by copyright. All rights are reserved. These materials may only be
used for private, non-commercial use only. Any unauthorized use, reproduction, modification, transfer,
distribution of part or all of these materials is strictly prohibited. Nothing in these materials shall grant
you any rights in or to the intellectual property or proprietary rights of Peritus Information Security
Services Private Limited or any third party.
Disclaimer
All the material presented in this training course is strictly for educational purposes. Peritus
Information Security Services Private Limited is not responsible for any misuse of the material.
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 3
Prerequisites
Exercise
Setup your machine with Java Runtime Environment required to run Burp Suite and WebGoat.
Prerequisites
N/A
Goals
Learn how to setup JRE required for running Burp Suite and WebGoat.
Steps
Install JRE version >= 1.6
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 4
Installation / Setup
Exercise
Install and Run WebGoat and Burp Suite.
Prerequisites
JRE version >= 1.6 installed.
Goals
Learn how to install and run WebGoat and Burp Suite.
Steps
1. Installing and running WebGoat
1. Download WebGoat from the link given below or the course material
https://github.com/WebGoat/WebGoat/releases/download/7.1/webgoat-
container-7.1-exec.jar
2. Running WebGoat
$ java -jar webgoat-container-7.1-exec.jar
3. See if the WebGoat is working by visiting
http://localhost:8080/WebGoat
Note: This training course uses Burp Suite Professional Edition but you are free to use Burp Suite
Community / Free Edition.
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 5
Configuration
Exercise
Configuring Burp Proxy and Browser.
Prerequisites
WebGoat and Burp Suite already running.
Goals
1. Learn how to setup Proxy.
2. Learn how to use extensions to ease the process of setting up Proxy.
3. Learn how to configure Burp Suite to work with HTTPS sites.
Steps
1. Setting up Proxy
1. Setup Burp Proxy Listener to listen at 127.0.0.1:8081. You can find `Proxy Listeners` in
Proxy → Options tab.
2. Forward browsers traffic to 127.0.0.1:8081 by changing proxy settings of the browser. For
Firefox, Preferences → Advanced → Network tab → Connection settings
3. Visit `http://localhost:8080/WebGoat/` and see if any traffic is getting forwarded to Burp
Proxy. Keep Intercept off and check in HTTP history tab of Burp Proxy.
2. Setting up FoxyProxy
1. Install `FoxyProxy Basic` extension for Firefox.
2. Go to Options of FoxyProxy Basic.
3. Click `Add New Proxy` and enter all the details with proxy set to 127.0.0.1:8081.
4. Activate this proxy and your browser will be able to forward traffic to Burp Proxy.
Note: You can download FoxyProxy extension for other browsers as well and configure it in the same
way.
Note: You can follow same steps for setting up Burp Proxy with HTTPS sites on other browsers.
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 6
Burp Basics
Exercise
Understanding Basics of Burp Suite.
Prerequisites
1. WebGoat and Burp Suite already running.
Goals
1. Learn how to create projects and save data of project.
Steps
1. Run Burp Suite and select `New project on disk`.
2. Enter filename and project name. This creates a project file and saves it.
3. Now, browse the application using browser as normal and you can directly close Burp Suite.
4. When you reopen Burp Suite you can directly select the project file and it will show the
whole project with same proxy settings, same history, etc.
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 7
Tools – I
Exercise
Understanding how to use Proxy, Repeater, Target, Spider, Scanner and Intruder.
Prerequisites
1. WebGoat and Burp Suite already running.
Goals
1. Learn how to use Proxy and Repeater to intercept, alter or repeat requests/responses.
Steps
1. PROXY and REPEATER
1. Intercepting Requests
2. Editing Requests
Note: You can also see requests/responses history via Burp Proxy → HTTP history.
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 8
3. Using Repeater
2. TARGET
1. Setting Scope
2. Using SiteMap
3. SPIDER
Note: You should manually review the spider settings before running it on any
website. It may have adverse effects.
4. SCANNER
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 9
1. Passive Scanning
2. Active Scanning
Note: You should manually review the scanner settings before running it on any
website. It may have adverse effects.
5. INTRUDER
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 10
Tools – II
Exercise
Understanding how to use Sequencer, Decoder, Comparer and Extender.
Prerequisites
1. WebGoat and Burp Suite already running.
Goals
1. Learn how to use Sequencer to live capture and analyze tokens.
Steps
1. SEQUENCER
1. Using Sequencer
Note: Sequencer can also do analysis if you directly provide tokens to it.
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 11
2. Decoder
1. Using Decoder
Note: You can use decoder to encode/decode various values you come across while
your pentesting.
3. Comparer
1. Using comparer
4. Extender
Note: You can also create your own extensions using APIs.
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 12
Exercise
Understanding how to use Engagement tools, Burp Collaborator and Burp Clickbandit.
Prerequisites
1. WebGoat and Burp Suite already running.
Goals
1. Learn how to use Engagement tools to auto discover content and auto create CSRF POC.
3. Learn how to use Burp Clickbandit to automate the process of creating clickjacking POC.
1. Engagement Tools
2. Burp Collaborator
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.
Burp Suite Mastery Lab Manual 13
3. Click `Run health check ...`. This is to verify if your Burp Client can contact the
Burp Public Collaborator Server.
4. Now, In Burp, locate the top menu bar and click `Burp Collaborator Client`.
5. Click `Copy to clipboard` to copy the payload which looks like
`lpea8oujjrjemzx9l15gj9w62x8nwc.burpcollaborator.net`.
6. Use this payload in your testing.
7. You can click `Poll now` to check if any outbound requests were received by
the server.
Note: You can also setup your own private collaborator server and then change
settings of `Burp Collaborator Server` in Project Options → Misc. This will make Burp
Client poll your private server.
3. Burp Clickbandit
1. Using Clickbandit
1. In Burp, locate the top menu bar and click `Burp Clickbandit`.
2. Click `Copy Clickbandit to clipboard`.
3. Login into WebGoat and visit
http://localhost:8080/WebGoat/start.mvc#attack/360466308/5. (This is
vulnerable to clickjacking)
4. Right click and go to `Inspect Element` and then go to `console`. Paste the
`clickbandit code` in console and hit `Enter`.
5. This will start Burp Clickbandit in Record mode.
6. Now, click on the areas which you want victim to click in your clickjacking
attack. For e.g. click on `Show Source` button and then hit `Finish` on top.
7. Now, clickbandit will go in Review Mode and you can change transparency
settings.
8. Hit `Save` when you are done.
9. This will generate an HTML file with the clickjacking attack.
@Copyright Peritus Information Security Services Private Limited. All rights reserved. The contents, or parts
thereof, may not be reproduced in any form for any purpose without the written permission of Peritus
Information Security Services Private Limited.