Burp Suite Cheat Sheet by Codelivly
Burp Suite Cheat Sheet by Codelivly
1. Getting Started
Launch Burp:
2. Proxy
Intercept Traffic:
HTTP History:
Attack Types:
Payloads:
● Choose the payload positions and set payload types: simple lists, brute-force numbers,
or custom dictionaries.
Launch Attack:
Launching a Scan:
Configure Scan:
● Burp Collaborator helps you detect Out-Of-Band vulnerabilities such as DNS lookups or
asynchronous HTTP requests by creating external service interactions.
Capture Tokens:
Manual Analysis:
● You can import session tokens from HTTP history or a manual list and assess their
randomness.
Load Extensions:
● Use the Extender tab to load additional functionality via BApp Store.
● You can also write your own extensions using the Burp Extender API.
Popular Extensions:
● Go to Decoder tab, paste data, and select encoding methods (Base64, URL encoding,
etc.).
Smart Decode:
● Use Smart Decode to let Burp automatically identify and decode the input.
Compare Requests/Responses:
Site Map:
● Browse through the site structure via Target > Site map.
● Highlight specific files or directories for further analysis.
Filter Options:
● Filter traffic in the Site Map to include/exclude specific types of requests (e.g.,
JavaScript, images).
● Combine multiple Burp tools for effective testing. For example, send a request from
Proxy to Intruder or Repeater, analyze responses, then repeat tests.
Save/Export Findings:
Common Shortcuts
This cheat sheet is designed to provide quick access to BurpSuite's most powerful features,
ensuring an efficient workflow when performing penetration tests and security audits.