Support Center

Burp Community

See what our users are saying about Burp Suite:

How do I?

New Post View All

Feature Requests

New Post View All

Burp Extensions

New Post View All

Bug Reports

New Post View All
Documentation

Burp Suite Documentation

Take a look at our Documentation section for full details about every Burp Suite tool, function and configuration option.

Full Documentation Contents Burp Projects
Suite Functions Burp Tools
Options Using Burp Suite
Extensibility

Burp Extender

Burp Extender lets you extend the functionality of Burp Suite in numerous ways.

Extensions can be written in Java, Python or Ruby.

API documentation Writing your first Burp Suite extension
Sample extensions View community discussions about Extensibility

Using Burp to Test for Security Misconfiguration Issues

Application misconfiguration attacks exploit configuration weaknesses found in web applications.

Security misconfiguration can happen at any level of an application stack, including the platform, web server, application server, database, and framework.

Many applications come with unnecessary and unsafe features, such as debug and QA features, enabled by default. These features may provide a means for a hacker to bypass authentication methods and gain access to sensitive information, perhaps with elevated privileges.

Likewise, default installations may include well-known usernames and passwords, hard-coded backdoor accounts, special access mechanisms, and incorrect permissions set for files accessible through web servers.

In this example we will demonstrate how to use Burp Spider and/or Site map to check for directory listings. This tutorial uses an exercise from the “Mutillidae” training tool.

The version of “Mutillidae” we are using is taken from OWASP’s Broken Web Application Project. Find out how to download, install and use this project.

First, ensure that Burp is correctly configured with your browser.

Ensure Burp Proxy "Intercept is off".

 

 

In your browser, visit the page of the web application you are testing.

In this example start by browsing to the Mutillidae home page.

 

Return to Burp.

Select the "Target" tab and then the "Site map" tab.

Locate and right click on the "Mutillidae" folder to bring up the context menu..

Click "Spider from here".

 

Although not necessarily a security vulnerability, directory listings are reported by Burp Scanner.

For example, if you have passive scanning enabled when you spider this application, "Directory listing" will be included in the Scanner "Results" tab.

 

Go to the "Target" tab and then the "Site map" tab.

Here you can view the site map for the web application which has been populated by Burp Spider.

Select an interesting branch from the Site map. In this case we will explore the "Includes" directory.

 

 

 

Return to your browser and access the directories you have chosen to investigate by adding the directory name to the URL.

In this example: /mutillidae/includes/.

 

 

Explore the links in each file and directory you are able to find.