Become a cyber pro by building your skills in the National Cyber League!
Have you ever wondered what happens when you surf the web?
This blog will discuss using Burp Suite (https://portswigger.net/burp) for a variety of network analysis such as:
- Analyze HTTP requests and responses
- Perform parameter tampering and modify http headers such as user-agent
- Look at and possibly modify web cookies
There are two versions of Burp Suite: the free Community Edition and the paid Enterprise Edition. The free Community Edition is pre-installed on Kali.
One of the major differences between the two editions is that nothing can be saved in the Community Edition.
This blog will walk through how to set up Burp Suite and set up Mozilla Firefox to use Burp Suite as a proxy. We will go through an example where we intercept, analyze, and modify a search request made to DuckDuckGo using Burp Suite. More specifically, we will search for the word “baseball” and will receive results for “football”.
Setting Up
Burp Suite
Start up Burp Suite. If you receive a warning message about Java, you can usually ignore it. If Burp Suite doesn’t work correctly, you will have to update your Java version to the one recommended in the message.
You should get a screen similar to the one below. Make note of the port number 8080 as you will need this later on.
Scrolling down the options will show what types of network packets are intercepted. In the screenshot shown below, files ending with extensions such as gif, jpg, png, css, and js are not intercepted. The default works well in most cases.
Mozilla Firefox
Now that Burp Suite is running, the next step is to set up Mozilla Firefox. Go to Settings/Preferences and click on “View Certificates”.
Note: There is an option to use Burp Suite built-in web browser. Setting up a different browser is shown here for flexibility.
This allows Burp Suite to act as a MITM even for encrypted HTTPS connections.
The next step is to set up Mozilla Firefox to use Burp Suite as a proxy.
Remember the port number from earlier?
You are now set up and can start using Mozilla Firefox with Burp Suite as the proxy (aka MITM).
Running
Go to back to Burp Suite → Proxy → Intercept and make sure that “Intercept is on” as shown below. On Mozilla Firefox, enter the URL “http://duckduckgo.com”
You will notice that nothing is loading. On the Burp Suite screen, you will see that the HTTP request has been intercepted. If you want to see the response, click on Action → Intercept Response. You can drop that packet or forward the packet to the real webserver.
Since the HTTP request has been intercepted, you will notice that all the HTTP headers are available. You can edit any of the fields in lines 1-10. If there was a web cookie, it will also be listed here. For POST requests, the POST data will be at the end — in the case above, it would be at line 9.
Since Burp Suite acts as a proxy or MITM, Mozilla Firefox will show the following error message.
Burp Suite will intercept the following packet.
What do you see on the search results for DuckDuckGo. Is it baseball or football? What happened?
Other Uses
We have shown how Burp Suite can be used to analyze HTTP packets and perform a simple parameter tampering. Burp Suite can also be used for other cases such as password cracking given a wordlist and for crawling a website.
This post was not affiliated, associated, authorized, endorsed by, or in any way officially connected with Port Swigger. The Burp Suite name and marks are registered trademarks of Port Swigger and are only used for informational purposes.
Published by DECT