Sec Research Lab
Back to Library
Web Security

Complete Burp Suite Tutorial 2026

February 3, 2026
Sec Research Lab Team

Sarah, a security researcher, used Burp Suite to intercept a suspicious shopping cart request and prevent a major breach before her coffee even got cold. In this tutorial, I will show you how to master the industry-standard tool for web penetration testing from the ground up.

What is Burp Suite? An Overview for the Modern Security Researcher

Burp Suite, developed by PortSwigger, is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application's scenario surface, through to finding and testing security vulnerabilities.

What makes Burp Suite truly special is its ability to act as an Intercepting Proxy. This means it sits between your browser and the target web server, allowing you to pause, inspect, and modify the raw HTTP/S traffic in real-time. To a cybersecurity professional, this is like having X-ray vision for the internet.

Installation & Step-by-Step Setup

Before we dive into the "security research" part, we need a solid laboratory environment. Burp Suite is cross-platform and runs on Java, which means it works seamlessly on Windows, macOS, and Linux.

1. Download and Installation

Head over to the PortSwigger website and download the Community Edition (which is free) or the Professional Edition if you have a license. Follow the standard installation wizard for your OS. For Linux users, the installer is typically a `.sh` script that needs execution permissions:

chmod +x burpsuite_community_linux_v2026_1.sh
./burpsuite_community_linux_v2026_1.sh

2. Configuring the Browser

The biggest challenge for beginners is often getting the browser to talk to Burp. While you can manually configure proxy settings (127.0.0.1:8080), the modern and recommended way is to use the Burp Built-in Browser. Navigating to the "Proxy" tab and clicking "Open Browser" circumvents all the certificate installation headaches that used to plague testers.

The "Big Five": Core Tools Explained

Mastering these five components is the secret to becoming a pro:

  • Proxy: The heart of Burp. It lets you intercept requests. Always keep "Intercept is on" when you want to modify a specific packet.
  • Repeater: My personal favorite. It allows you to send a single request to the server over and over again with slight modifications. This is where 90% of manual vulnerability hunting happens.
  • Intruder: The automation powerhouse. It allows you to perform fuzzing, brute-forcing, and credential stuffing. Think of it as a customizable sniper rifle for HTTP requests.
  • Decoder: A simple but essential tool for transforming data. Whether it's Base64, URL encoding, or Hex, Decoder handles it instantly.
  • Scanner: (Pro Only) An world-class automated vulnerability scanner that identifies everything from low-hanging fruit to complex logic flaws.

Practical Walkthrough: Finding Your First SQL Injection

Let's get our hands dirty. Imagine a target website with a search feature. Here is the methodology I use to find SQL injections manually:

Step 1: Intercept the Request

Turn on "Intercept" in Burp and perform a search on the target site for the word "test". Burp will catch the request. It might look like this:

GET /search.php?id=test HTTP/1.1
Host: target-site.com
...

Step 2: Send to Repeater

Right-click the request and select "Send to Repeater" (Ctrl+R). Switch to the Repeater tab. Now we can experiment without re-triggering the browser.

Step 3: Test for Syntax Errors

Change `id=test` to `id=test'`. Note the single quote. Click "Send". If the server returns a "Database Error" or a "500 Internal Server Error", you've likely found a point where your input is breaking the SQL query logic.

Step 4: Confirm with a Boolean Test

Try sending `id=test' AND 1=1--`. If the page loads normally, and then `id=test' AND 1=2--` causes it to change or error out, congratulations—you've just confirmed a SQL Injection vulnerability.

Professional Tips & Advanced Tricks

After years in the field, here are the things they don't tell you in basic tutorials:

  • Use Extensions: The "BApp Store" is a goldmine. Install "Turbo Intruder" for high-speed automation and "Logger++" for better visibility into what Burp is doing.
  • Scope is Everything: Always define your Target Scope early. This prevents Burp from filling your history with "noise" from background services like Google Analytics or Windows updates.
  • Hotkey Mastery: Learn Ctrl+R (Repeater), Ctrl+I (Intruder), and Ctrl+U (URL Encode). Speed is efficiency in penetration testing.

Common Mistakes Beginners Make

Mistake #1: Not understanding the proxy flow. Burp operates as a man-in-the-middle proxy. Requests flow through Burp before reaching servers. Beginners often misconfigure listeners or forget to enable the proxy in their browser.

Mistake #2: Ignoring response analysis. Beginners often focus on request modification but skip response examination. The response content, headers, and status codes reveal critical technology stack and internal logic details.

Mistake #3: Running automated scans without understanding findings. Burp's automated scanner generates extensive reports, but they can contain false positives. Your job is validating findings and crafting proof-of-concept Security Scenarios manually.

Burp Suite Comparison: Community vs. Professional

Feature Community (Free) Professional ($399/yr)
Interception Proxy Yes Yes
Vulnerability Scanner No Yes (Automated)
Intruder Speed Throttled (Slow) Unlimited (Fast)
Collaboration Tools No Yes

Mastery Learning Path

  1. PortSwigger Academy: Complete the free labs to understand vulnerability types.
  2. BApp Store: Learn to use extensions like Logger++ and Retire.js.
  3. Manual Practice: Focus on Repeater to understand how applications handle edge cases.

Ready to put theory into practice?

Test your skills in our interactive labs and see if you can find the vulnerabilities you just read about.

Begin Free Training