Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Burp Suite

From Wikipedia, the free encyclopedia
Web security software
icon
This articlerelies excessively onreferences toprimary sources. Please improve this article by addingsecondary or tertiary sources.
Find sources: "Burp Suite" – news ·newspapers ·books ·scholar ·JSTOR
(August 2024) (Learn how and when to remove this message)
Burp Suite
Logo of PortSwigger, the company that develops Burp Suite
DeveloperPortSwigger
Stable release
2025.3.3[1] / 23 April 2025; 7 months ago (23 April 2025)
Written inJava
TypeSecurity testing
Websiteportswigger.net/burp Edit this on Wikidata

Burp Suite is a proprietary software tool forsecurity assessment andpenetration testing of web applications.[2][3] It was initially developed in 2003-2006 by Dafydd Stuttard[4] to automate his own security testing needs, after realizing the capabilities of automatable web tools likeSelenium.[5] Stuttard created the company PortSwigger to flagship Burp Suite's development. A community, professional, and enterprise version of this product are available.

Notable capabilities in this suite include features to proxy web-crawls (Burp Proxy),[6] log HTTP requests/responses (Burp Logger and HTTP History), capture/intercept in-motion HTTP requests (Burp Intercept),[7] and aggregate reports which indicate weaknesses (Burp Scanner).[8] This software uses a built-in database containing known-unsafe syntax patterns and keywords to search within captured HTTP requests/responses.[9]

Burp Suite possesses several penetration-type functionalities. A few built-in PoC services include tests for HTTP downgrade,[10] interaction with tool-hosted external sandbox servers (Burp Collaborator),[11] and analysis for pseudorandomization strength (Burp Sequencer).[12] This tool permits integration of user-defined functionalities through download of open-sourceplugins (such as Java Deserialization Scanner[13] and Autorize[14]).

Features

[edit]

As aweb security analyzer, Burp Suite offers several built-in features designed to assist testers in auditing their web applications.

Community Edition

[edit]
BurpSuite Community Edition

The Community Edition version of Burp Suite includes the following features.[15]

  • Burp Proxy and Interceptor: Like otherweb application security scanners, one of the primary functionalities behind Burp Suite is its capability to act as aproxy server for client-side HTTP requests.[16] Penetration testers can intercept web servers' default HTTP requests variables (attributes, body parameters, cookies, headers) in real-time and edit these values on-the-fly.[17]
  • Burp Site Map: BurpSuite operates similarly to theOWASP ZAP software, wherein target URLs' site maps can be captured either through automatic or manual web-crawling.[18] When users crawl through a web application, HTTP requests become sent to a web proxy in Burp Suite's software. Once HTTP requests/responses are captured, these endpoints can be investigated manually or audited automatically through features in Burp Suite's Professional edition.
  • Burp Logger and HTTP History: Retains a list of HTTP requests/responses captured during web-crawling (and automated scanning for Professional edition).[19][20]
  • Burp Repeater: Repeats captured HTTP requests, allowing custom changes to request variables.[21] Customized HTTP requests can be sent in quick succession and can be used to exploit race condition vulnerabilities.[22]
  • Burp Decoder: Automates text decoding.[23] Decoded text can then be edited and re-encoded, allowing for enhanced customization in web requests. Currently, Burp can encode and decode inHTML,URL,Base64,ASCII hex,Hex,Octal,Binary, andGZIP. Burp’s “smart decode” will automatically detect encoded data and recursively decode it as much as it can.[24]
  • Burp Sequencer: Analyzes an application-generated token variable across repeated HTTP requests to determine pseudorandomness predictability strength.
  • Burp Comparer: Allows users to compare content found between two different HTTP requests or HTTP responses.[25]
  • Burp Extender: See theBurp Extender section below; certain Burp Suite plugins are limited to only interact with Professional edition.[26]

Professional Edition

[edit]

Burp Suite's Professional edition includes all Community features plus those listed below.

  • Burp Scanner: Automates report auditing and/or web crawling for HTTP captured requests/responses. Uses internal rules to audit contents from intercepted HTTP responses in order to search for vulnerable response values. Capacitates users to customize scanners' speeds and findings coverage.
  • Burp Dashboard: Displays findings results and categorizes issues based on severity.[27] Detailed descriptions and remediation steps may be provided based on what type of finding.[28]
  • Burp Intruder: Similarly to Burp Repeater at a broader extent, grants users the means to send multiple parallel HTTP requests with changes to specified request variables.[29]
  • Burp Collaborator: SimulatesC2 Server hosting to attempt external service interaction and Out-of-Band attacks.[30]
  • Burp Organizer: Allows users to curate selected HTTP requests/responses into a saved collection.[31]
  • Burp Infiltrator: An IAST agent scripted to automate interactive/runtime scanning and communicate results through the Burp Collaborator feature.[32]
  • Burp Clickbandit: A tool to concept proof to test clickjacking attacks against web applications' front-end HTML and JavaScript files.[33]
  • File Saving: Professional edition allows users to save their projects as ".burp" files.[34]

Burp Extender

[edit]

BAppsBurp Suite offers an extension store[35] where users can upload and download plugins for functionalities not supported natively. Different plugins alter in functionality, ranging from adjustments for UI readability, additions to scanner rules, and implementations of new analysis-based features.

Burp Suite's extension API is open-source.[36][37] Support for Java plugins is natively supported, while extensions which use Python and Ruby require users to download JAR files for Jython and JRuby respectively.[38]

Many Burp plugins have also been created by Portswigger employees as a means of developing proof-of-concepts for research conducted by the company.[39] Examples of these include extensions created by James Kettle, Portswigger's Director of Research,[40] including Backslash Powered Scanner,[41][42] Param Miner,[43][44] and HTTP Request Smuggler.[45][46]

BChecks

[edit]

BChecks were added to Burp Suite in June 2023[47] as a means of permitting users to create and customize their own scanner rules.[48] A curated collection of BChecks are maintained by Portswigger through an open-sourceGitHub project.[49]

Bambdas

[edit]

Users can write Java scripts to create custom HTTP request/response index filtering in Burp Suite's proxy HTTP History, WebSocket History, and Logger lists.[50][51]

See also

[edit]

References

[edit]
  1. ^"Professional / Community 2025.3.3". Retrieved4 May 2025.
  2. ^Rahalkar, Sagar Ajay (2021).A Complete Guide to Burp Suite: Learn to Detect Application Vulnerabilities. Apress.ISBN 978-1-4842-6401-0.
  3. ^Lozano, Carlos A.; Shah, Dhruv; Walikar, Riyaz Ahemed (2019-02-28).Hands-On Application Penetration Testing with Burp Suite. Packt Publishing.ISBN 9781788995283.
  4. ^PortSwigger."About".PortSwigger. Retrieved2024-07-09.
  5. ^PortSwigger (9 July 2020)."Ask me anything, with Burp Suite creator Dafydd Stuttard".YouTube. Retrieved2020-07-09.
  6. ^Rose, Adam (21 April 2023)."Proxy VM Traffic Through Burp Suite".FortyNorth Security. Retrieved2024-07-09.
  7. ^Setter, Matthew (6 December 2017)."Introduction to Burp Suite".Web Dev With Matt. Retrieved2017-12-06.
  8. ^Lavish, Zandt."Intro to Burp Suite Automatic Scanning".GreatHeart. Retrieved2022-07-12.
  9. ^Shelton-Lefley, Tom."Web Application Cartography: Mapping Out Burp Suite's Crawler".PortSwigger. Retrieved2021-03-05.
  10. ^PortSwigger."HTTP/2 Normalization in the Message Editor".PortSwigger. Retrieved2024-07-09.
  11. ^Stuttard, Dafydd."Introducing Burp Collaborator".PortSwigger. Retrieved2015-04-16.
  12. ^Stuttard, Dafydd."Introducing Burp Sequencer".PortSwigger. Retrieved2007-10-21.
  13. ^"Java Deserialization Scanner".GitHub. Retrieved2024-07-09.
  14. ^"Autorize".GitHub. Retrieved2024-07-09.
  15. ^""Burp Suite : Home page"".portswigger.net. Retrieved2016-02-24.
  16. ^PortSwigger."Proxy".PortSwigger. Retrieved2024-07-09.
  17. ^Setter, Matthew (9 February 2018)."How to Intercept Requests and Modify Responses With Burp Suite".YouTube. Retrieved2018-02-09.
  18. ^PortSwigger."Full Crawl and Audit".PortSwigger. Retrieved2024-07-09.
  19. ^Aggarwal, Sahil (11 January 2023)."BurpSuite Logger Secrets for Pentesters".CertCube Blog. Retrieved2023-01-11.
  20. ^Pradeep."Filtering Burp Suite HTTP History".Study Tonight. Retrieved2023-06-02.
  21. ^TryHackMe."Burp Suite Repeater".TryHackMe. Retrieved2024-07-09.
  22. ^"Race Conditions".PortSwigger.
  23. ^Chandel, Raj (24 January 2018)."BurpSuite Encoder Decoder Tutorial".Hacking Articles. Retrieved2018-01-24.
  24. ^"Burp Decoder".PortSwigger. December 19, 2024.
  25. ^Salame, Walid (9 April 2024)."How to Use Burp Decoder".KaliTut. Retrieved2024-04-09.
  26. ^PortSwigger."Installing Extensions".PortSwigger. Retrieved2024-07-09.
  27. ^PortSwigger."Dashboard".PortSwigger. Retrieved2024-07-09.
  28. ^PortSwigger."Vulnerabilities List".PortSwigger. Retrieved2024-07-09.
  29. ^FireCompass (31 October 2023)."Mastering Burp Intruder Attack Modes".FireCompass Blog. Retrieved2023-10-31.
  30. ^PortSwigger."OAST".PortSwigger. Retrieved2024-07-09.
  31. ^PortSwigger."Organizer".PortSwigger. Retrieved2024-07-09.
  32. ^Stuttard, Dafydd."Introducing Burp Infiltrator".PortSwigger. Retrieved2016-07-26.
  33. ^Roof, Zach."Learn Clickjacking With Burp Suite".Teachable. Retrieved2024-07-09.
  34. ^PortSwigger."Manage Project Files".PortSwigger. Retrieved2024-07-09.
  35. ^PortSwigger."BApp Store".PortSwigger. Retrieved2024-07-09.
  36. ^PortSwigger."Creating Extensions".PortSwigger. Retrieved2024-07-09.
  37. ^"Burp Extensions Montoya API".GitHub. Retrieved2024-07-09.
  38. ^"TryHackMe Burp Suite Extensions".Medium. Retrieved2024-03-21.
  39. ^PortSwigger."Research".PortSwigger. Retrieved2024-07-09.
  40. ^PortSwigger."Meet the Swiggers: James K".PortSwigger. Retrieved2024-07-09.
  41. ^"Backslash Powered Scanner".GitHub. Retrieved2024-07-09.
  42. ^Kettle, James."Backslash Powered Scanning: hunting unknown vulnerability classes".PortSwigger Research. Retrieved2016-11-04.
  43. ^"Param Miner".GitHub. Retrieved2024-07-09.
  44. ^Kettle, James."Practical Web Cache Poisoning".PortSwigger Research. Retrieved2018-09-09.
  45. ^"HTTP Request Smuggler".GitHub. Retrieved2024-07-09.
  46. ^Kettle, James."HTTP Desync Attacks: Request Smuggling Reborn".PortSwigger Research. Retrieved2019-09-07.
  47. ^PortSwigger."Professional Community 2023.6".PortSwigger. Retrieved2024-07-09.
  48. ^"Use BCheck to Improve Vulnerability Scanning".YesWeHack. Retrieved2023-09-01.
  49. ^"BChecks".GitHub. Retrieved2024-07-09.
  50. ^Stocks, Emma."Introducing Bambdas".PortSwigger. Retrieved2023-11-14.
  51. ^"Bambdas".GitHub. Retrieved2024-07-09.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Burp_Suite&oldid=1321445150"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp