--- search: exclude: true --- # Burpsuite Setup ![](0.png) ## Introduction : Burpsuite is a Java Application developped by PortSwigger which is used as a pentest framework for web applications. In this tutorial we're going to look at how it can be commonly used. ## **Installation** First let's install [FoxyProxy](https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/?utm_source=addons.mozilla.org&utm_medium=referral&utm_content=search) ![](1.png) ![](2.png) ![](3.png) Then we install burpsuite: apt install burpsuite ## **Intercepting HTTP requests** Now let's configure FoxyProxy to intercept the request we make to the server: ![](4.png) ![](5.png) Now let's test it: ![](6.png) So here we intercepted the request we made for the server, we didn't forward it yet. GET /login.php HTTP/1.1 Host: previse.htb User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:99.0) Gecko/20100101 Firefox/99.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close Cookie: PHPSESSID=s4pu8loq7vmi15a095ipjl1095 Upgrade-Insecure-Requests: 1 Usually what we want to do is test what we can send to the web server, repeatedly. To do that we use the repeater tab (**CTRL+R** to send the request to the repeater tab and **CTRL+SHIFT+R** to go to the repeater tab): ![](7.png) So from here we can change the request and keep sending it to check how the web server behaves differently: ![](8.png) ## **Intercepting HTTPS requests** Now that we managed to intercept our HTTP request let's do the same with HTTPS, it requires a little more setup: While the intercept is on, let's go to **http://burp** in order to download burpsuite's certificate: ![](9.png) [ 10.10.14.68/23 ] [ /dev/pts/20 ] [~/Downloads] → file cacert.der cacert.der: Certificate, Version=3 And now with this we want our firefox browser to consider this certificate as secure, via a security exception: ![](10.png) ![](11.png) ![](12.png) Now with this change we can intercept HTTPS traffic: ![](14.png) Now do the 2 keybinds to send the request to the repeater tab: ![](15.png) And there you have it ! We have been able to intercept both HTTP and HTTPS traffic via burpsuite to debug how websites respond to our requests!