SlideShare a Scribd company logo
Tips and tricks
for Burp Suite Pro
Ten years later...
Nicolas Grégoire aka @Agarri_FR Northsec 2023
Intro
2
Who am I?
Nicolas Grégoire
Twitter → @Agarri_FR
Email → nicolas.gregoire@agarri.fr
Founder & owner of Agarri
Pentest, training and research
Official Burp Suite training partner
Mostly for Europe (I cover North America too )
100+ trainees per year (either on-site and online)
3
What is the plan?
Core tools
Proxy History / Repeater
Intruder/ Collaborator
Extensions
Hackvertor / Piper / Burp Bounty
Other subjects
Hotkeys / Poor-man automation
Performances / How to stay up to date
Enjoy Montreal
4
Core tools
Proxy History
5
Avoid scrolling
Problem
Need to scroll to see fresh entries
Cause → Burp Suite shows the oldest entry on top
Solution
Reverse the sorting order
Click on the header of the # column
Watch out for the small arrow pointing down!
That also works in Logger (core tool) and Logger++ (extension) 6
Identify sequences
Problem
Mapping actions to traffic is hard
Solution #1
Highlight the top row before triggering an action
I would use the grey color
Solution #2
When intercepting, highlight and comment the first request
I would use the yellow color
7
Core tools
Repeater
8
Avoid scrolling
Problem
You want to see a specific piece of the response
Like the element <div class="status">
Solution
Enter a search criteria
Check "Auto-scroll to match when text changes"
9
Search among tabs
Problem
Tabs are propely labeled, and groups too
How to search among them?
Solution
Use Control + Shift + S (action "Search tabs")
That also works in Intruder and Collaborator 10
Core tools
Intruder
11
Built-in wordlists
Burp Suite Pro ships with ~ 50 wordlists
They can be accessed in two clicks
Relevant payload types
Simple list
Character substitution
Case modification
Illegal Unicode
12
Built-in wordlists
Built-in wordlists can be exported
Adding lists (possibly from 3rd-parties) is also doable
From the menu bar
Use "Intruder > Configure predefined payload lists"
13
Built-in wordlists
A dozen of wordlists contain placeholders
Naming isn't standardized
{FILE} versus {KNOWNFILE}
{domain} versus <yourservername>
Replacements must be manually configured
Check next page for details
14
Built-in wordlists
Relevant payload processing rules
"Replace {base} with base value of payload position"
"Replace {domain} with collaborator interaction id"
"Match/replace" (for {FILE} , <youremail> , ...)
15
Core tools
Collaborator
16
Sneaky interactions
Common assumption
Pingbacks must use the Collaborator domain name
Is that really true?
17
Sneaky interactions
Yes, it's true
For DNS interactions
No, it isn't true
For HTTP interactions
18
Sneaky interactions
Let's look at IP addresses...
rsnbh[...]8zzno.oastify.com
→ 54.77.139.23 (and 3.248.33.252 too)
nsec-364d8b17.nip.io
→ 54.77.139.23
My correlation ID is rsnbh[...]8zzno 19
Sneaky interactions
$ curl http://nsec-364d8b17.nip.io/yolo/rsnbh[...]8zzno
20
Sneaky interactions
$ curl -A rsnbh[...]8zzno http://nsec-364d8b17.nip.io/
21
Extensions
Hackvertor
22
Hackvertor
Provides more than 200 transformers
And hundreds of charsets
Transformers can be chained
Simply stack them up!
Transformation happens on-the-fly
23
Hackvertor
Basic example
<@base64><@gzip_compress>Hello Northsec!<@/gzip_compress><@/base64>
↓
H4sIAAAAAAAA//NIzcnJV/DLLyrJKE5NVgQAA4ANhw8AAAA=
24
Hackvertor
Generate fake data
<@fake_hacker("Does the $adjective $noun $verb?","en-GB")/>
↓
Does the optical hard drive back up?
Does the digital transmitter parse?
Does the multi-byte alarm copy?
This feature is provided by com.github.javafaker 25
Hackvertor
Set a global variable
<@set_email(true)><@base64>nicolas.gregoire@agarri.fr<@/base64><@/set_email>
Generate a signed JWT
<@jwt('HS256','secretkey')>{"email":"<@get_email/>","uid":12345}<@/jwt>
The true flag defines the email variable as global 26
Hackvertor
Exploit a TE.CL vulnerability
POST / HTTP/1.1
Host: vulnerable-website.com
Content-Length: <@arithmetic(2,'+')><@length>[...]<@/length><@/arithmetic>
Transfer-Encoding: chunked
<@chunked_dec2hex><@length><@get_chunk/><@/length><@/chunked_dec2hex>
<@set_chunk(false)>SMUGGLED SMUGGLED<@/set_chunk>
0
27
Hackvertor
Sign the body of a request
[...]
X-Token: <@set_token(false)>foobar123456<@/set_token>
X-Sig: <@hmac_sha1('<@get_token/>')><@get_body/><@/hmac_sha1>
[...]
<@set_body(false)>name=joe&surname=john&role=admin<@/set_body>
28
Hackvertor
Well-known transformations
<@base64> , <@sha256> , <@length> , <@lowercase> ,...
Access to the base request
<@context_url> , <@context_param> , <@context_header> , ...
Script execution
<@python> (Jython v2.7.0), <@groovy> (v3.0.7), <@java> , ...
Command execution
<@system>
29
Hackvertor
Warning
Hackvertor will break Burp syntax parsing
That will impact
Syntax highlighting
Automatic detection of injection points
Automatic URL-encoding
30
Extensions
Piper
31
Piper
Executes anything within Burp Suite
Interpeters, CLI and GUI tools, ...
Numerous use-cases
Display JSON data using gron
Open a PDF file using Okular
Compare messages using delta or Meld
Uniquely identify bodies using md5sum
Detect JWT-authenticated requests using grep
Bypass WAF by modifying Scanner payloads using sed
32
Piper + Gron
Demo!
Display JSON data using gron
33
Piper + Okular
Demo!
Open a PDF file using Okular
34
Piper + Meld
Demo!
Compare three requests using Meld
35
Extensions
Burp Bounty
36
Burp Bounty
Extension that allows to add scan checks
No need to write your own extension
Useful when farming 1-day vulnerabilities
Should be superseded by BChecks
Something like "Nuclei for Burp Suite"
It will be released as a core feature in the next weeks
37
BChecks
Burp Scanner for pentesters
https://www.youtube.com/watch?v=mDYsmfeSxd8&t=2241s 38
Other subjects
Keyboard shortcuts
39
Use combos
Problem
Multi-step interactions are executed dozens of times a day
Like sending a request from Proxy History to Repeater
Solution
Use a combination of keyboard shortcuts
Control + R → Send to Repeater
Control + Shift + R → Switch to Repeater
Control + Space → Issue Repeater request
40
Other subjects
Poor-man automation
41
Poor-man automation
We need two ingredients
A live task in Burp Suite
Configured to scan everything passing through the proxy
The command-line tool ffuf
Configured to replay findings through a proxy
42
Poor-man automation
Configure the live task
43
Poor-man automation
Run ffuf
$ ffuf -u https://www.agarri.fr/FUZZ
-w wordlist.txt
-mc 200
-replay-proxy http://127.0.0.1:8080
44
Other subjects
Performances
45
Performances
Problem
Burp Suite consumnes a lot of resources
Opinion
Computers are way cheaper than brains
Solution
Use an oversized computer (CPU, RAM and screen estate)
46
Other subjects
How to stay up to date
47
How to stay up to date
PortSwigger on Youtube
https://www.youtube.com/@PortSwiggerTV
PortSwigger on Twitter
https://twitter.com/PortSwigger
https://twitter.com/Burp_Suite
https://twitter.com/BApp_Store
My own dedicated account
https://twitter.com/MasteringBurp
48
Outro
49
Want the slides?
https://www.agarri.fr/docs/nsec23-burp_tips_n_tricks.pdf
50
Want more content?
I'll soon release an online workshop
Details
Cost → Free
Subject → Session management for Apps and APIs
Date → During NahamCon (June 16th, 2023)
51
Thanks for listening!
Any questions?
Nicolas Grégoire aka @Agarri_FR Northsec 2023

More Related Content

PPT
Teapot dome
PPT
Ellis island compressed
PPTX
The gold rush
PPSX
Web application security
PPTX
The Road to Civil War (1850-1860)
PPTX
Cross Domain Hijacking - File Upload Vulnerability
PPT
The History of Shays’s Rebellion
PPT
Greek civilization
Teapot dome
Ellis island compressed
The gold rush
Web application security
The Road to Civil War (1850-1860)
Cross Domain Hijacking - File Upload Vulnerability
The History of Shays’s Rebellion
Greek civilization

What's hot (20)

PPT
Civilizations of latin america
PPTX
Urbanization ch. 10.2
PDF
Chapter 5: Alexander the Great
PPT
13 colonies
PPT
American Imperialism
PDF
కాలేబు జీవితము (the life of caleb.pdf)
PPTX
Ancient china geography
PPTX
Alexander the Great and the Spread of Hellenistic Culture
PPT
Trail of Tears
PPT
Jacksonian Democracy Presentation
PPTX
Ch. 14.1 the united states enters world war i
PDF
APUSH Lecture Ch. 13
PPTX
Estudos CACD Missão Diplomática - História Mundial Aula Resumo 01 (1776 a 1815)
PDF
Greek Culture
PPT
Key Events Leading to the Civil War
PPTX
The olmec culture
PPTX
Pericles
PDF
Apparao
PPTX
Network Penetration Testing
PPTX
The Changing American Population (1800-1860)
Civilizations of latin america
Urbanization ch. 10.2
Chapter 5: Alexander the Great
13 colonies
American Imperialism
కాలేబు జీవితము (the life of caleb.pdf)
Ancient china geography
Alexander the Great and the Spread of Hellenistic Culture
Trail of Tears
Jacksonian Democracy Presentation
Ch. 14.1 the united states enters world war i
APUSH Lecture Ch. 13
Estudos CACD Missão Diplomática - História Mundial Aula Resumo 01 (1776 a 1815)
Greek Culture
Key Events Leading to the Civil War
The olmec culture
Pericles
Apparao
Network Penetration Testing
The Changing American Population (1800-1860)

Similar to Burp suite pro tips and tricks for hacking (20)

PDF
BSides Lisbon 2013 - All your sites belong to Burp
PPTX
Burp Suite Starter
PDF
Burp suite
PPTX
Burp Suite With CSRF Demo presentarion.pptx
PPT
Pentesting Using Burp Suite
PPTX
Dive in burpsuite
PPTX
Burp suite
PPTX
Hack like a pro with burp suite by pavanw3b
PDF
Burp documentation
PDF
The Evil Tester's Guide to HTTP proxies Tutorial
PPTX
Web Hacking With Burp Suite 101
PPTX
Burp Suite Professional – Paid, with full-featured scanner and advanced tools.
PDF
Burp suite
PDF
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
PPTX
Jon Gorenflo - Burp Collaborator
PPTX
Burp Suite Extension Development
PPTX
Burp better - Finding Struts and XXE Vulns with Burp Extensions
PDF
Burp-ing through your cryptography shield
PPTX
How to use Burpe Suite Intruder for beginner
PPTX
Burp suite
BSides Lisbon 2013 - All your sites belong to Burp
Burp Suite Starter
Burp suite
Burp Suite With CSRF Demo presentarion.pptx
Pentesting Using Burp Suite
Dive in burpsuite
Burp suite
Hack like a pro with burp suite by pavanw3b
Burp documentation
The Evil Tester's Guide to HTTP proxies Tutorial
Web Hacking With Burp Suite 101
Burp Suite Professional – Paid, with full-featured scanner and advanced tools.
Burp suite
DevSecCon Singapore 2019: Workshop - Burp extension writing workshop
Jon Gorenflo - Burp Collaborator
Burp Suite Extension Development
Burp better - Finding Struts and XXE Vulns with Burp Extensions
Burp-ing through your cryptography shield
How to use Burpe Suite Intruder for beginner
Burp suite

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Empathic Computing: Creating Shared Understanding
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Electronic commerce courselecture one. Pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
sap open course for s4hana steps from ECC to s4
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Empathic Computing: Creating Shared Understanding
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Electronic commerce courselecture one. Pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Network Security Unit 5.pdf for BCA BBA.
sap open course for s4hana steps from ECC to s4
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced methodologies resolving dimensionality complications for autism neur...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
Encapsulation_ Review paper, used for researhc scholars
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx

Burp suite pro tips and tricks for hacking