Burp Suite is the single tool that defines modern web application testing. If you can drive Burp confidently you can deliver 80% of a web pentest. This walkthrough takes a complete beginner from installation to finding a real authorization bug, using the latest 2026 UI and the workflow our AppSec consultants actually use on engagements.
Install and configure (5 minutes)
- Download Burp Suite Community from PortSwigger and start it
- Open the embedded Chromium browser via 'Open Browser' — it pre-trusts Burp's CA so you skip cert warnings
- If you prefer Firefox, install the FoxyProxy add-on and point it at 127.0.0.1:8080
- Visit http://burpsuite and download the CA cert; import to Firefox under Settings → Privacy → Certificates → Authorities
- Make a single HTTPS request and confirm it appears in Proxy → HTTP history
The five Burp tools you actually use
| Tool | Use it for | Frequency |
|---|---|---|
| Proxy | Capturing and inspecting traffic | Every request |
| Repeater | Mutating one request and replaying | Every finding |
| Intruder | Brute-force, parameter fuzzing, IDOR enumeration | Most engagements |
| Decoder | Encoding swaps (base64, URL, hex, JWT split) | Daily |
| Collaborator | Out-of-band detection (SSRF, blind XSS, blind SQLi) | Most engagements |
Your first workflow — find a BOLA bug
BOLA (Broken Object Level Authorization, OWASP API #1) is the most common high-severity finding in modern apps. Here's how to find one in 10 minutes on any app with numeric IDs.
- Log in as User A. Browse the app. Find any endpoint with a numeric ID like /api/orders/4012
- Right-click the request in Proxy → HTTP history → Send to Repeater
- In Repeater, change the ID to 4011 and Send. Did the response come back? You may already have BOLA
- To prove it, log in as User B in a separate browser. Note your Cookie / Authorization header
- Send User A's request again with User B's session — if you get User B's data back, document it
- Move to Intruder to enumerate IDs and quantify the blast radius
GET /api/orders/4011 HTTP/2
Host: api.target.com
Authorization: Bearer eyJ... (User A's token)
Accept: application/json
# Mutate ID, leave the token alone
# Then mutate the token, leave the ID alone
# Combinations of both = the BOLA matrixIntruder for parameter fuzzing
Send the BOLA request to Intruder. Mark the ID parameter with the § markers. Use Sniper attack with a Numbers payload from 1 to 5000, step 1. Sort the results by response length — outliers tell you which IDs returned data.
Collaborator — finding what you can't see
Burp Collaborator gives you a unique DNS / HTTP server to detect blind vulnerabilities. If you inject your Collaborator URL into a parameter and the target's server makes a DNS lookup back to it, you've found SSRF / blind XXE / blind RCE.
POST /api/avatars/import HTTP/2
Host: target.com
{"url": "http://abc123.oastify.com"}
# Then check Collaborator → Poll now for a hitExtensions every tester installs
- Autorize — automated authorization checks across two sessions (BOLA at scale)
- JWT Editor — decode, edit, re-sign JWTs in Repeater
- Param Miner — finds hidden GET / POST / header parameters
- Hackvertor — encoding chains (great for WAF bypass)
- Logger++ — searchable history with regex filters
- Active Scan++ — extra checks (CSTI, host header, blind SSRF)
The 8 mistakes new testers make
- Testing in production without scope — get written approval first
- Not turning off intercept and forgetting why nothing loads
- Running Active Scan against authenticated state without a session handling rule
- Using Intruder against rate-limited APIs and getting their account locked out
- Forgetting to disable upstream proxies before testing internal IPs
- Saving Burp project to a network share — corrupts on disconnect
- Not exporting the project file (.burp) before reformat / OS upgrade
- Treating a 200 response as a vulnerability without verifying the data returned
Our Web AppSec deep-dive is one of several hands-on tracks Macksofy delivers across India and the UAE. CERT-In empanelled, OffSec/EC-Council authorized, with weekend cohorts and corporate batches.
