Your Hacking Toolkit
In Lesson 1, you hacked a website with just a browser. That's fine for simple vulnerabilities, but real web hacking requires better tools.
Today we're setting up Burp Suite — the industry-standard tool for web application testing. By the end of this lesson, you'll be able to intercept, inspect, and modify any HTTP request your browser makes.
What You'll Install
- Burp Suite Community Edition — Free proxy and testing tool
- Browser Proxy Configuration — Route traffic through Burp
- Burp's CA Certificate — Intercept HTTPS traffic
- FoxyProxy (optional) — Easy proxy switching
Step 1: Download Burp Suite
- Go to portswigger.net/burp/communitydownload
- Download the installer for your operating system:
- Windows:
.exeinstaller - Mac:
.dmgfile - Linux:
.shscript
- Windows:
- Install it like any other application
- Launch Burp Suite
First Launch: Accept the terms, choose "Temporary project", then "Use Burp defaults" and click "Start Burp".
Step 2: Understand the Interface
When Burp opens, you'll see several tabs. Here are the important ones:
| Tab | Purpose |
|---|---|
| Proxy | Intercept and modify requests |
| Target | Map out the application |
| Repeater | Manually modify and resend requests |
| Intruder | Automated attacks (limited in Community) |
| Decoder | Encode/decode data |
For now, focus on the Proxy tab. This is where the magic happens.
Step 3: Configure Your Browser
Burp acts as a proxy — it sits between your browser and the internet, letting you see and modify everything.
Option A: Manual Browser Configuration
Firefox (Recommended for Testing)
- Open Firefox Settings
- Search for "proxy"
- Click "Settings..." in Network Settings
- Select "Manual proxy configuration"
- Enter:
- HTTP Proxy:
127.0.0.1Port:8080 - Check "Also use this proxy for HTTPS"
- HTTP Proxy:
- Click OK
Chrome
- Chrome uses system proxy settings
- Go to your OS network settings
- Set HTTP/HTTPS proxy to
127.0.0.1:8080
Option B: Use FoxyProxy (Easier)
FoxyProxy is a browser extension that makes switching proxies easy.
- Install FoxyProxy for Firefox or Chrome
- Click the FoxyProxy icon → Options
- Add a new proxy:
- Title:
Burp Suite - Proxy Type: HTTP
- Proxy IP:
127.0.0.1 - Port:
8080
- Title:
- Save and select "Burp Suite" from the FoxyProxy menu when testing
Step 4: Test the Connection
- Make sure Burp Suite is running
- In Burp, go to Proxy → Intercept and make sure "Intercept is on"
- In your configured browser, visit
http://example.com - Nothing happens! The page doesn't load.
- Check Burp — you should see the request waiting in the Intercept tab
- Click Forward to send the request
- The page loads in your browser
Congratulations! You just intercepted your first HTTP request.
Step 5: Install Burp's CA Certificate
Right now, you can intercept HTTP traffic. But most sites use HTTPS. Try visiting https://google.com — you'll get a security error.
Burp needs to perform a "man-in-the-middle" attack on HTTPS traffic. For this to work without errors, you need to trust Burp's certificate.
Download the Certificate
- With your browser proxied through Burp, visit:
http://burp - Click "CA Certificate" to download
cacert.der
Install on Firefox
- Open Firefox Settings
- Search for "certificates"
- Click "View Certificates"
- Go to "Authorities" tab
- Click "Import"
- Select the
cacert.derfile you downloaded - Check "Trust this CA to identify websites"
- Click OK
Install on Chrome (Mac)
- Open Keychain Access
- Drag
cacert.derinto the "System" keychain - Double-click "PortSwigger CA"
- Expand "Trust"
- Set "When using this certificate" to "Always Trust"
- Close and enter your password
Install on Chrome (Windows)
- Open
certmgr.msc - Navigate to Trusted Root Certification Authorities → Certificates
- Right-click → All Tasks → Import
- Import
cacert.der
Test HTTPS Interception
- Visit
https://google.com - No security errors!
- Check Burp — you can see the HTTPS request
Step 6: Basic Proxy Usage
Now let's learn the core proxy workflow.
Intercept Mode
With "Intercept is on", every request pauses for your review:
- Forward — Send the request as-is
- Drop — Block the request entirely
- Action — Send to other Burp tools
This is useful when you want to modify specific requests.
Passive Mode
Click the button so it says "Intercept is off". Now requests flow through automatically, but everything is logged in Proxy → HTTP history.
This is useful for:
- Exploring an application normally
- Reviewing requests after the fact
- Finding interesting endpoints
HTTP History
Go to Proxy → HTTP history to see every request your browser made.
Click any request to see:
- Full request (right panel, top)
- Full response (right panel, bottom)
Step 7: The Repeater — Your New Best Friend
The Repeater is where you'll spend most of your time. It lets you manually modify and resend requests.
Send a Request to Repeater
- In HTTP history, find an interesting request
- Right-click → "Send to Repeater"
- Go to the Repeater tab
Modify and Resend
In Repeater, you can:
- Edit any part of the request
- Click "Send" to make the request
- See the response immediately
- Modify again and resend
Try it:
- Send any request to Repeater
- Find a parameter in the URL or body
- Change its value
- Click Send
- See how the response changes
This is manual vulnerability testing. Change something, see what happens.
Pro Tips
Keep one browser (Firefox) for testing with proxy, and another (Chrome) for normal browsing. This prevents accidentally proxying personal traffic.
In Target → Scope, add your target domain. Then in Proxy settings, you can filter to only show in-scope items.
Ctrl+R — Send to RepeaterCtrl+I — Send to IntruderCtrl+Shift+T — Switch to Target tabCtrl+Shift+P — Switch to Proxy tab
Go to Burp → Save project regularly. You don't want to lose hours of reconnaissance.
What You Can Do Now
With this setup, you can:
- See every request your browser makes
- Intercept and modify requests before they're sent
- Replay requests with different parameters
- Test for vulnerabilities manually
- Understand exactly how a web application works
This is the foundation for everything that comes next.
Challenge: Explore a Test Site
- Configure your browser to proxy through Burp
- Visit
http://testphp.vulnweb.com/ - Browse around — check the search, login, guest book
- Find at least 5 interesting requests in your HTTP history
- Send them to Repeater
- Try adding
'to parameters — do you get any errors?
This site is intentionally vulnerable. You have permission to test it.
What's Next?
You've got your lab set up. In Lesson 4: Cross-Site Scripting (XSS), we'll use these tools to find and exploit XSS vulnerabilities systematically — not just the obvious ones.
Time to hunt.