Burp Suite Tutorial: Web Application Hacking for Beginners (2026 Edition)
Why Burp Suite Is the #1 Web Hacking Tool
Burp Suite is used by over 70,000 security professionals worldwide. It's the industry standard for web application penetration testing — combining an intercepting proxy, scanner, and manual testing tools in one platform.
| Edition | Price | Best For |
|---|---|---|
| Community | Free | Learning, basic manual testing |
| Professional | $449/year | Professional pentesting |
| Enterprise | Custom | CI/CD integration, team scanning |
You can follow this entire tutorial with the free Community Edition.
Step 1: Installation & Browser Setup
Install Burp Suite
# Download from PortSwigger
# https://portswigger.net/burp/communitydownload
# macOS (via Homebrew)
brew install --cask burp-suite
# Linux (direct download)
chmod +x burpsuite_community_linux_*.sh
./burpsuite_community_linux_*.sh
Configure Browser Proxy
Burp intercepts traffic by acting as a proxy between your browser and the target.
- Open Burp Suite → Start with default settings
- Proxy tab → Note the proxy is on 127.0.0.1:8080
- Browser setup:
Firefox (recommended):
Settings → Network Settings → Manual Proxy → 127.0.0.1:8080
Chrome (use FoxyProxy extension):
Install FoxyProxy → Add proxy: 127.0.0.1:8080 → Enable
- Install Burp's CA certificate (for HTTPS interception):
- Browse to http://burp
- Download CA Certificate
- Import into browser's certificate store
Step 2: Understanding the Interface
Key Tabs
| Tab | Purpose |
|---|---|
| Proxy | Intercept, modify, and forward HTTP requests |
| Target | Site map and scope configuration |
| Repeater | Manually modify and resend requests |
| Intruder | Automated parameter fuzzing and brute-forcing |
| Scanner | Automated vulnerability scanning (Pro) |
| Decoder | Encode/decode data (Base64, URL, hex) |
| Comparer | Diff two responses to spot differences |
Step 3: Intercepting and Modifying Requests
Practice Target
Use a deliberately vulnerable app:
# DVWA (Damn Vulnerable Web Application)
docker run -d -p 80:80 vulnerables/web-dvwa
# OWASP Juice Shop
docker run -d -p 3000:3000 bkimminich/juice-shop
# PortSwigger labs (browser-based)
# https://portswigger.net/web-security
Intercept a Login Request
- Turn on interception: Proxy → Intercept → Intercept is on
- Submit a login form on your target
- Burp catches the request:
POST /login HTTP/2
Host: target.com
Content-Type: application/x-www-form-urlencoded
username=admin&password=test123
- Modify the request — change parameters, headers, cookies
- Click Forward to send it, or Drop to cancel
Step 4: Using Repeater for Manual Testing
Repeater lets you send the same request over and over with modifications — essential for testing injection attacks.
Testing for SQL Injection
- Capture a request with a parameter:
?id=1 - Send to Repeater (Ctrl+R)
- Try injection payloads:
Original: ?id=1
Test 1: ?id=1' → Look for SQL error
Test 2: ?id=1 OR 1=1 → Look for different response
Test 3: ?id=1 UNION SELECT null,null,null → Determine column count
Test 4: ?id=1 UNION SELECT username,password,null FROM users
Testing for XSS
Original: ?search=hello
Test 1: ?search=<script>alert(1)</script>
Test 2: ?search="><img src=x onerror=alert(1)>
Test 3: ?search=javascript:alert(1)
Test 4: ?search={{7*7}} → Template injection check
Step 5: Using Intruder for Automated Attacks
Brute-Forcing a Login
- Capture a login request
- Send to Intruder (Ctrl+I)
- Set attack positions:
POST /login HTTP/2
Host: target.com
username=§admin§&password=§test§
- Set payloads:
- Position 1: Usernames wordlist
- Position 2: Passwords wordlist (rockyou-top-1000.txt)
- Set attack type: Cluster Bomb (tests all combinations)
- Start attack → Look for different response length/status code
Parameter Fuzzing for IDOR
GET /api/users/§1§/profile HTTP/2
Host: target.com
Authorization: Bearer your-token-here
Set payload: Numbers 1-1000. Look for 200 responses to IDs that aren't yours.
Step 6: Useful Burp Extensions
Install from Extender → BApp Store:
| Extension | Purpose |
|---|---|
| Autorize | Automatic authorization testing (IDOR detection) |
| Logger++ | Enhanced request/response logging |
| JSON Beautifier | Format JSON in Proxy/Repeater |
| Param Miner | Discover hidden parameters |
| Turbo Intruder | Faster Intruder with Python scripting |
| JWT Editor | Decode, modify, and forge JWT tokens |
| Hackvertor | Advanced encoding/tag-based transformations |
Step 7: OWASP Top 10 Testing with Burp
| Vulnerability | Burp Technique |
|---|---|
| Broken Access Control | Intruder IDOR fuzzing + Autorize extension |
| Injection (SQL/XSS) | Repeater with payloads + Scanner (Pro) |
| Auth Bypass | Repeater — modify JWT, session cookies |
| SSRF | Repeater — inject internal URLs in parameters |
| Security Misconfiguration | Check response headers, error pages |
| Sensitive Data Exposure | Search Proxy history for tokens, passwords |
Quick Reference: Essential Keyboard Shortcuts
| Shortcut | Action |
|---|---|
| Ctrl+R | Send to Repeater |
| Ctrl+I | Send to Intruder |
| Ctrl+Space | Forward intercepted request |
| Ctrl+Shift+D | Send to Decoder |
| Ctrl+F | Search in response |
The best way to learn Burp Suite is to practice. Start with PortSwigger Web Security Academy labs — they're free, browser-based, and cover every OWASP vulnerability with step-by-step solutions.
Advertisement
Free Security Tools
Try our tools now
Expert Services
Get professional help
OWASP Top 10
Learn the top risks
Related Articles
Threat Modeling for Developers: STRIDE, PASTA & DREAD with Practical Examples
Threat modeling is the most cost-effective security activity — finding design flaws before writing code. This guide covers STRIDE, PASTA, and DREAD methodologies with real-world examples for web, API, and cloud applications.
Building a Security Champions Program: Scaling Security Across Dev Teams
Security teams can't review every line of code. Security Champions embed security expertise in every development team. This guide covers program design, champion selection, training, metrics, and sustaining engagement.
The Ultimate Secure Code Review Checklist for 2025
A comprehensive, language-agnostic checklist for secure code reviews. Use this as your team's standard for catching vulnerabilities before they reach production.