๐ป PART 2: PRACTICAL (STEP-BY-STEP)
Let's simulate how a real bug bounty hunter uses Burp
Step 1: Setup Burp Suite
- Open Burp Suite
- Go to Proxy โ Intercept โ ON
Step 2: Configure Browser
Set proxy:
- IP: 127.0.0.1
- Port: 8080
or use Burp's built-in browser
Step 3: Install Burp Certificate(VERY IMPORTANT)
Without this, HTTPS won't work.
Steps: 1. Go to: http://burp 2. Download certificate 3. Install in browser
Step 4: Intercept a Request
- Open a website.
- Enter username/password.
- Burp will capture request. Example โ POST/login HTTP/1.1 username=admin&password=1234
Step 5: Modify Request(Manual Testing)
Change โ username=admin' OR ฦ'=ฦ
This tests SQL Injection.
Step 6: Send to Repeater
- Right-click โ Send to Repeater
- Modify parameters repeatedly
Example test:
- id=1 โ id=2 โ id=3
- Check if data changes
This helps find IDOR
Step 7: Use Intruder(Automation)
- Send request to intruder
- Select parameter
- Add payload list
Step 8: Analyze Responses
Look for:
- Status codes(200,403,500)
- Response length changes
- Error messages
Real Example: Finding IDOR
Captured request: GET/api/user?id=1001
Change: GET/api/user?id=1002
If you see another user's data = Vulnerability found
๐ฅ Pro Workflow (Real Bug Bounty Style)
- Recon(find subdomains)
- Open site in Burp
- Intercept all requests
- Send important ones to : โ Repeater (manual testing) โ Intruder (automation)
- Analyze responses
- Report bug
๐ก Pro Tips (Very Important)
- Always test: โ IDs(id=1,2,3) โ Hidden parameters โ Cookies
- Focus on: โ APIs(/api/) โ Auth endpoints
- Learn manual testing deeply(don't rely only on automation)
๐จ Common Beginner Mistakes
- Not installing certificate
- Blindly using Intruder
- Ignoring Repeater(big mistake!)
- Not understanding HTTP basics
Final Understanding
Burp Suite is powerful because:
- It gives full cover over web traffic.
- Enables manual + automated testing.
- Helps uncover real-world vulnerabilities.