","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-11","name":"Compare Two HTTP Responses","description":"Code example","text":"# Send two requests to Comparer\n# Right-click response 1 > Send to Comparer\n# Right-click response 2 > Send to Comparer\n# Comparer > Words/Bytes comparison","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-12","name":"Configure Target Scope","description":"Code example","text":"# Target > Scope > Add\n# Protocol: https, Host: example.com\n# Check 'Use advanced scope control'\n# Enable: 'Show only in-scope items'","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-13","name":"Save Project State","description":"Code example","text":"# Burp menu > Project > Save project\n# File: mytest.burp\n# Includes: HTTP history, scanner results, configurations","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-14","name":"Filter HTTP History by Status Code","description":"Code example","text":"# Proxy > HTTP history > Filter bar\n# Show only: 4xx [client errors]\n# Or: 2xx [successful responses]","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-15","name":"Configure Upstream Proxy","description":"Code example","text":"# Settings > Network > Connections\n# Upstream Proxy Servers > Add\n# Destination: * (all), Proxy: corporate-proxy:3128","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-16","name":"Match and Replace Rules","description":"Code example","text":"# Settings > Tools > Proxy > Match and Replace\n# Add > Type: Request header\n# Match: User-Agent:.*\n# Replace: User-Agent: CustomBot/1.0","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-17","name":"Session Handling Rules","description":"Code example","text":"# Settings > Sessions > Session Handling Rules\n# Add > Get tokens from macro\n# Configure macro to fetch fresh CSRF token","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-18","name":"Extract Data with Grep","description":"Code example","text":"# Intruder > Options > Grep - Extract\n# Add > Select response area containing data\n# Intruder results show extracted values per request","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-19","name":"Throttle Request Rate","description":"Code example","text":"# Intruder > Resource pool > Create new\n# Maximum concurrent requests: 1\n# Delay between requests: 1000ms","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-20","name":"Search HTTP History","description":"Code example","text":"# Proxy > HTTP history > Search bar\n# Enter: admin OR password\n# Case sensitive: No","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-21","name":"Active Scan Single Request (Pro)","description":"Code example","text":"# Right-click request in HTTP history\n# Scan > Active scan this host\n# Configure: Crawl limit, scan speed","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-22","name":"Generate CSRF POC","description":"Code example","text":"# Right-click POST request\n# Engagement tools > Generate CSRF PoC\n# Choose: HTML or form","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-23","name":"Analyze Randomness in Sequencer","description":"Code example","text":"# Send token response to Sequencer\n# Sequencer > Start live capture\n# Minimum 100 samples for analysis","inLanguage":"bash"},{"@type":"CreativeWork","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#snippet-24","name":"Configure Invisible Proxy","description":"Code example","text":"# Settings > Tools > Proxy > Options\n# Proxy Listeners > Add\n# Binding: All interfaces, Port: 80\n# Support invisible proxying: Yes","inLanguage":"bash"}],"keywords":"burp suite cheat sheet, proxy intercept, intruder commands, scanner setup, troubleshooting errors, how to install burp suite, burp suite step by step, burp suite proxy not working, how to intercept requests burp suite, burp suite vs owasp zap, burp-suite, proxy, web-security, penetration-testing, vulnerability-scanning","about":[{"@type":"Thing","name":"burp-suite"},{"@type":"Thing","name":"proxy"},{"@type":"Thing","name":"web-security"},{"@type":"Thing","name":"penetration-testing"},{"@type":"Thing","name":"vulnerability-scanning"}]},{"@type":"ItemList","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#topics","name":"Core Concepts - Burp Suite Cheat Sheet DATA | Proxy Intercept + Web Security Testing Guide","numberOfItems":5,"itemListElement":[{"@type":"ListItem","position":1,"name":"Proxy Intercept: Traffic Capture Foundation","description":"Burp Proxy sits between browser and server, capturing all HTTP/HTTPS traffic on port 8080 (default). Requires browser proxy configuration and SSL certificate installation for HTTPS. See how to install Burp Suite examples below","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#core-concepts"},{"@type":"ListItem","position":2,"name":"Intruder Commands: Automated Payload Testing","description":"Intruder automates customized attacks by injecting payloads into request positions. Configure attack types (Sniper, Battering ram, Pitchfork, Cluster bomb) based on parameter testing needs","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#core-concepts"},{"@type":"ListItem","position":3,"name":"How to Use Repeater Burp Suite: Manual Testing","description":"Repeater enables manual request modification and resending. Right-click any request > Send to Repeater. Ideal for SQL injection, XSS, and authentication bypass testing with instant response feedback","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#core-concepts"},{"@type":"ListItem","position":4,"name":"Scanner Setup: Automated Vulnerability Detection","description":"Professional-only feature performing automated crawl and audit. Dashboard > New Scan > Enter URL. Detects SQL injection, XSS, SSRF, and 100+ vulnerability types with configurable scan policies","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#core-concepts"},{"@type":"ListItem","position":5,"name":"Burp Suite Step by Step: Decoder & Comparer","description":"Decoder transforms data between formats (Base64, URL, HTML, Hex). Comparer visualizes differences between two requests/responses. Essential for analyzing obfuscated parameters and A/B response testing","url":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#core-concepts"}]},{"@type":"TechArticle","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#article","headline":"Burp Suite Cheat Sheet DATA | Proxy Intercept + Web Security Testing Guide","description":"Complete reference guide","image":[{"@type":"ImageObject","url":"https://yourcheatsheet.org/images/burp-suite-beginner-og","width":1200,"height":630},{"@type":"ImageObject","url":"https://yourcheatsheet.org/images/burp-suite-beginner-og","width":800,"height":800}],"author":{"@id":"https://yourcheatsheet.org/author/brian-o'reilly"},"publisher":{"@id":"https://yourcheatsheet.org/about"},"inLanguage":"en-US","isAccessibleForFree":true,"keywords":"burp suite cheat sheet, proxy intercept, intruder commands, scanner setup, troubleshooting errors, how to install burp suite, burp suite step by step, burp suite proxy not working, how to intercept requests burp suite, burp suite vs owasp zap, burp-suite, proxy, web-security, penetration-testing, vulnerability-scanning","speakable":{"@type":"SpeakableSpecification","cssSelector":["#top","#quick-start","#when-to-use","#core-concepts","#snippets","#master-commands","#production-examples","#production-fixes","#pitfalls","#troubleshooting","#elite-pro-hack","#workflows","#benchmark","#resources"]},"potentialAction":[{"@type":"ReadAction","target":{"@type":"EntryPoint","urlTemplate":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner"}},{"@type":"DownloadAction","name":"Download PDF","target":{"@type":"EntryPoint","urlTemplate":"https://yourcheatsheets.org/downloads/burp-suite-beginner.pdf"}}]},{"@type":"BreadcrumbList","@id":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://yourcheatsheet.org"},{"@type":"ListItem","position":2,"name":"Security-Tools","item":"https://yourcheatsheet.org/categories/Security-Tools"},{"@type":"ListItem","position":3,"name":"Burp Suite Cheat Sheet DATA | Proxy Intercept + Web Security Testing Guide","item":"https://yourcheatsheets.org/cheatsheets/burp-suite-beginner"}]}]}

Quick Start with Burp Suite Beginner

Production-ready compilation flags and build commands

PROXY INTERCEPT: QUICK START (5s)

Copy → Paste → Live

java -jar burpsuite_community.jar
# Proxy > Intercept > Intercept On
# Browser: Set proxy 127.0.0.1:8080
# Visit any site → Request captured
$
HTTP request intercepted in Proxy > Intercept tab. Learn more in how to intercept requests Burp Suite section
⚡ 5s Setup

When to Use Burp Suite Beginner

Decision matrix per scegliere la tecnologia giusta

IDEAL USE CASES

  • Web application penetration testing with HTTP/HTTPS traffic analysis

  • Vulnerability scanning and security assessment for production APIs

  • Request manipulation and authentication bypass testing in development environments

AVOID FOR

  • Network-level packet analysis (use Wireshark instead)

  • Mobile app reverse engineering without proxy support

  • Real-time monitoring of high-throughput production systems (performance impact)

Core Concepts of Burp Suite Beginner

Production-ready compilation flags and build commands

#1

Proxy Intercept: Traffic Capture Foundation

Burp Proxy sits between browser and server, capturing all HTTP/HTTPS traffic on port 8080 (default). Requires browser proxy configuration and SSL certificate installation for HTTPS. See how to install Burp Suite examples below

✓ Solution
Set Proxy > Intercept toggle to 'Intercept off' - requests automatically forward
+100% visibility into client-server communication
#2

Intruder Commands: Automated Payload Testing

Intruder automates customized attacks by injecting payloads into request positions. Configure attack types (Sniper, Battering ram, Pitchfork, Cluster bomb) based on parameter testing needs

+500% efficiency vs manual testing
200 requests/second with Community Edition, 2000+ with Professional
#3

How to Use Repeater Burp Suite: Manual Testing

Repeater enables manual request modification and resending. Right-click any request > Send to Repeater. Ideal for SQL injection, XSS, and authentication bypass testing with instant response feedback

+300% precision in vulnerability validation
#4

Scanner Setup: Automated Vulnerability Detection

Professional-only feature performing automated crawl and audit. Dashboard > New Scan > Enter URL. Detects SQL injection, XSS, SSRF, and 100+ vulnerability types with configurable scan policies

✓ Solution
Upgrade to Professional ($449/year) or use passive scanning only
#5

Burp Suite Step by Step: Decoder & Comparer

Decoder transforms data between formats (Base64, URL, HTML, Hex). Comparer visualizes differences between two requests/responses. Essential for analyzing obfuscated parameters and A/B response testing

+200% speed in payload crafting