๐Ÿ’ป PART 2: PRACTICAL (STEP-BY-STEP)

Let's simulate how a real bug bounty hunter uses Burp

Step 1: Setup Burp Suite

  1. Open Burp Suite
  2. Go to Proxy โ†’ Intercept โ†’ ON

Step 2: Configure Browser

Set proxy:

  • IP: 127.0.0.1
  • Port: 8080

or use Burp's built-in browser

Step 3: Install Burp Certificate(VERY IMPORTANT)

Without this, HTTPS won't work.

Steps: 1. Go to: http://burp 2. Download certificate 3. Install in browser

Step 4: Intercept a Request

  1. Open a website.
  2. Enter username/password.
  3. Burp will capture request. Example โ†’ POST/login HTTP/1.1 username=admin&password=1234

Step 5: Modify Request(Manual Testing)

Change โ†’ username=admin' OR ฦ‡'=ฦ‡

This tests SQL Injection.

Step 6: Send to Repeater

  • Right-click โ†’ Send to Repeater
  • Modify parameters repeatedly

Example test:

  • id=1 โ†’ id=2 โ†’ id=3
  • Check if data changes

This helps find IDOR

Step 7: Use Intruder(Automation)

  1. Send request to intruder
  2. Select parameter
  3. Add payload list

Step 8: Analyze Responses

Look for:

  • Status codes(200,403,500)
  • Response length changes
  • Error messages

Real Example: Finding IDOR

Captured request: GET/api/user?id=1001

Change: GET/api/user?id=1002

If you see another user's data = Vulnerability found

๐Ÿ”ฅ Pro Workflow (Real Bug Bounty Style)

  1. Recon(find subdomains)
  2. Open site in Burp
  3. Intercept all requests
  4. Send important ones to : โ†’ Repeater (manual testing) โ†’ Intruder (automation)
  5. Analyze responses
  6. Report bug

๐Ÿ’ก Pro Tips (Very Important)

  • Always test: โ†’ IDs(id=1,2,3) โ†’ Hidden parameters โ†’ Cookies
  • Focus on: โ†’ APIs(/api/) โ†’ Auth endpoints
  • Learn manual testing deeply(don't rely only on automation)

๐Ÿšจ Common Beginner Mistakes

  • Not installing certificate
  • Blindly using Intruder
  • Ignoring Repeater(big mistake!)
  • Not understanding HTTP basics

Final Understanding

Burp Suite is powerful because:

  • It gives full cover over web traffic.
  • Enables manual + automated testing.
  • Helps uncover real-world vulnerabilities.