WEBVTT

00:07.070 --> 00:09.620
We're going to mess around with a tool called Burp Suite.

00:09.650 --> 00:15.080
Now, Burp Suite, for sizea purposes is limited to web application scanning.

00:15.110 --> 00:19.730
Now burp burp suite entire can do penetration testing.

00:19.730 --> 00:21.800
I've used it before for SQL injections.

00:21.800 --> 00:25.310
I've used it for a lot of different aspects, especially on the free version.

00:25.550 --> 00:33.920
But however, and I preface this by saying that Cisa only identifies it for web application scanning,

00:33.920 --> 00:37.160
which is a little bit weird that they have this tool in here.

00:37.190 --> 00:42.470
And the reason I say that is because usually CompTIA for their certifications is very much like we want

00:42.500 --> 00:43.640
free versions tools.

00:43.640 --> 00:49.010
We don't want anything that costs money, but the web application portion or the web application scanner

00:49.010 --> 00:52.010
portion of Burp Suite is actually locked behind a paywall.

00:52.010 --> 00:57.020
So I'm not really sure what CompTIA was thinking when they threw this in here, but that's okay.

00:57.020 --> 00:59.930
We're going to go very high level overview of it.

00:59.930 --> 01:03.750
Just realize that we're not going to show the paid version because I don't want to show you something

01:03.750 --> 01:08.040
that you don't really have access to without actually paying for it.

01:08.220 --> 01:14.310
And I don't think CompTIA is going to provide us with anything that you really wouldn't be able to understand

01:14.310 --> 01:15.630
based off the other tools.

01:15.630 --> 01:17.250
So let's get right into it.

01:17.280 --> 01:19.410
We're going to open up our terminal.

01:19.800 --> 01:20.850
Let me blow this up for you.

01:20.850 --> 01:23.250
And there's literally three ways to access this tool.

01:23.250 --> 01:25.020
I think I've only been showing you the one way.

01:25.020 --> 01:26.970
So today we're going to actually go through all three ways.

01:26.970 --> 01:29.850
I could type in Burpsuite just like that.

01:29.850 --> 01:33.030
And by providing that blue over there, I can start it up just like that.

01:33.030 --> 01:34.110
That's one way.

01:34.140 --> 01:40.860
The second way is I can open up a little Kali Linux icon right there, and I can go down to web applications

01:40.890 --> 01:41.670
analysis.

01:41.670 --> 01:43.290
And there it is right there.

01:43.680 --> 01:47.040
The third way is I can go to the search menu and just type in burp.

01:47.040 --> 01:47.910
And there it is.

01:47.940 --> 01:49.410
So we're going to open this sucker up.

01:49.440 --> 01:51.570
Obviously I'm using the community edition.

01:51.810 --> 01:53.880
I'm going to press next for temporary.

01:53.880 --> 01:56.400
And I'm going to use Burp Suite defaults.

01:56.760 --> 01:58.830
And we're going to get the sucker started up.

01:59.340 --> 02:03.240
Now the very first screen that you should see looks something like this.

02:03.240 --> 02:04.900
And it says Getting Started with Burp Suite.

02:04.900 --> 02:10.150
You can go through Burp Suite and it provides a quick tutorial of how to use Burp Suite.

02:10.180 --> 02:15.580
You can also do guided tours provides you all the in-depth walkthrough of everything I won't I don't

02:15.580 --> 02:18.970
want to say in-depth, but it will provide you a walkthrough of the tool.

02:18.970 --> 02:24.850
You could do video tutorials over specific features of the tool, but again, many of them are stuck

02:24.850 --> 02:25.900
behind a paywall.

02:25.930 --> 02:31.900
You could do a Web Security Academy, which goes into finding out more about vulnerabilities using Burp

02:31.900 --> 02:32.380
Suite.

02:32.410 --> 02:36.940
You could do the support center or you can use Twitter under the dashboard.

02:36.940 --> 02:42.010
This is normally where you would go through and actually do a new web vulnerability scan.

02:42.010 --> 02:45.100
But you can see here that it's grayed out because it's locked behind a paywall.

02:45.100 --> 02:46.810
So we really don't have that feature.

02:46.810 --> 02:50.500
But again, it's it's pretty much a web application scanner.

02:50.500 --> 02:55.840
You're really not going to get much more out of it than you would with any of the other web application

02:55.840 --> 02:58.540
scanners that we've shown you, i.e. Nikto or zap.

02:58.540 --> 03:00.160
I really like zap.

03:00.430 --> 03:02.530
Um, and I don't think Burp Suite.

03:02.560 --> 03:07.330
It does a good job, but I prefer zap, honestly, so I'm not really upset about it being locked behind

03:07.330 --> 03:07.870
a paywall.

03:07.900 --> 03:10.300
Some people would argue and they say burpsuite is better.

03:10.330 --> 03:10.840
Yeah.

03:10.870 --> 03:12.730
Flavors for different folks, I guess.

03:13.000 --> 03:17.860
Uh, under your target icon you can get a sitemap, you can identify the targets.

03:17.860 --> 03:20.590
You can go through that process for the epoxy.

03:20.620 --> 03:22.540
You can turn the intercept on and off.

03:22.540 --> 03:28.660
And again this is much more utilized in web application penetration testing than it is anything else

03:28.660 --> 03:29.320
we can do.

03:29.320 --> 03:34.720
The intruder which provides us automated tasks if we want to go through that repeater which modifies

03:34.720 --> 03:40.360
and resends individual requests so we can repeat commands, the collaborator sounds just like it is

03:40.390 --> 03:45.730
the sequencer which provides requests and other tools to configure live captures.

03:46.000 --> 03:47.020
We could do a decoder.

03:47.050 --> 03:48.700
Sounds like exactly what it does.

03:48.700 --> 03:51.670
We could do a compare again, exactly like it sounds.

03:51.730 --> 03:54.160
Uh, logger again, exactly like it sounds.

03:54.160 --> 03:55.990
And then finally the organizer.

03:56.230 --> 03:57.430
Uh, I forgot extensions.

03:57.430 --> 04:02.590
So you can actually add extensions into Burp Suite that third parties have utilized uh, throughout

04:02.590 --> 04:02.800
that.

04:02.800 --> 04:05.340
Now, Burp Suite is pretty extensive tool.

04:05.340 --> 04:09.250
And I could spend an entire day going through everything that Burpsuite has to offer.

04:09.250 --> 04:16.090
But the good news is, as far as Cisa exam is concerned, we only are concerned with that live scan

04:16.120 --> 04:18.940
or excuse me, that that web application scan.

04:19.180 --> 04:24.880
And I feel like if you see Burpsuite scan on there, you'll be able to identify it pretty quickly.

04:25.060 --> 04:27.040
Again, it's not available in the free version.

04:27.040 --> 04:33.040
So you can't really go through this, um, through the community edition if you really want to, you

04:33.040 --> 04:34.180
could pay for the paid version.

04:34.180 --> 04:39.850
I don't suggest it as a brand new cyber security person, or even an intermediate.

04:39.850 --> 04:44.560
If you're going to get into penetration testing, then I would suggest, yeah, Burpsuite is a great

04:44.560 --> 04:50.530
tool for Pentesting, but for web application scanning for a defensive tool, it's not anywhere close

04:50.530 --> 04:51.730
to my top ten.

04:51.940 --> 04:54.520
For Pentesting, it definitely is, but not for defensive.

04:54.520 --> 04:56.890
And that's what Cisa really concentrates on.

04:56.890 --> 05:01.360
So the high level overview of Burpsuite, we really didn't do much with the tool, but I hope you learned

05:01.360 --> 05:02.350
something from it.

05:02.380 --> 05:07.300
And again, if you want more details just go to that learn and you can find all kinds of valuable information

05:07.300 --> 05:07.690
right here.

05:07.720 --> 05:07.930
All right.

05:07.960 --> 05:08.740
That's it for today.

05:08.740 --> 05:10.180
We'll see you next time.
