Cyber Research Wiki

Burp Suite

An intercepting proxy–based toolkit and dynamic scanner for discovering and analyzing web application and API security issues across desktop and enterprise (DAST) editions.

Overview

Burp Suite is a family of web application security testing products from PortSwigger organized around an intercepting HTTP(S)/WebSocket proxy and an integrated dynamic scanner. The desktop line (Community and Professional) combines manual analysis tools—such as Proxy, Repeater, Intruder, Sequencer, Decoder, Comparer, and Logger—with crawl-and-audit capabilities. Burp Suite DAST extends these foundations to organization‑wide, automated dynamic testing with management and CI/CD integrations. Together, the editions support exploratory testing, automated vulnerability discovery, and reporting across a range of application architectures and workflows.

What It Is

Burp Suite is a modular platform for web and API security testing. In the desktop editions, it functions as a hands‑on toolkit centered on an intercepting proxy and a browser‑assisted scanner that performs passive and active checks. In the enterprise‑oriented DAST edition, it operates as a scalable dynamic testing system. Core components include Burp Proxy for traffic interception and modification; Burp Scanner for crawl‑and‑audit analysis; and Burp Collaborator, an out‑of‑band application security testing (OAST) facility that observes DNS/HTTP callbacks to surface otherwise invisible issues. The platform is extensible via the BApp Store and public extension APIs, enabling custom checks and integrations.

How It Works

Client traffic—typically from a browser or mobile application—is routed through Burp Proxy. To analyze encrypted flows, Burp generates and uses its own root CA certificate, enabling man‑in‑the‑middle inspection of TLS for HTTP(S) and WebSocket messages. Burp Scanner augments manual exploration with pipelines that crawl application surfaces and audit discovered endpoints. Passive checks observe normal traffic, while active checks craft and send test requests to elicit evidence of vulnerabilities; findings are consolidated in the interface and can be exported. For out‑of‑band detection, Burp Collaborator injects unique callback payloads and monitors a dedicated server for subsequent network interactions, correlating observed callbacks with originating test vectors. Edition boundaries shape capabilities: Professional exposes the full desktop toolkit and automated scanning; Community emphasizes manual tooling; DAST provides enterprise‑scale automation and management aligned with CI/CD.

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

high