This page may be out of date

We haven't updated it for a while because we're busy working on new, improved content to help you get the most out of Burp Suite. In the meantime, please note that the information on this page may no longer be accurate.

Visit our Support Center

The Burp Methodology

This page contains links to all our step-by-step methodology articles.

  1. Using Burp to Bypass Client-Side Controls
  2. Using Burp to Attack Authentication
  3. Using Burp to Attack Session Management
  4. Using Burp to Test Access Controls
  5. Using Burp to Test for SQL Injection Flaws
  6. Using Burp to Find Cross-Site Scripting Vulnerabilities
  7. Cross-Site Scripting Filters
  8. Using Burp to Attack Back-End Components