This curriculum spans the full lifecycle of a professional vulnerability assessment engagement using Burp Suite, comparable in scope to a multi-phase security testing program conducted across complex web applications and APIs in regulated environments.
Module 1: Planning and Scoping Vulnerability Assessments with Burp Suite
- Define target scope by mapping application entry points, including REST APIs, GraphQL endpoints, and legacy web forms, to prevent out-of-scope findings.
- Negotiate authorization boundaries with stakeholders to determine whether scans include authenticated paths, third-party integrations, or staging environments.
- Select scan depth based on risk tolerance—limited crawling for production systems versus full depth for pre-deployment testing.
- Establish rate-limiting thresholds to avoid application denial-of-service during automated crawling and scanning activities.
- Document exceptions for dynamic content such as CSRF tokens, session rotation, and CAPTCHA to inform scan configuration.
- Coordinate change windows with operations teams to align scanning activities with maintenance schedules and minimize impact on monitoring systems.
Module 2: Configuring Burp Suite for Target-Specific Scanning
- Configure scope rules to include subdomains, API gateways, and content delivery networks while excluding external domains and advertisement networks.
- Set up authentication mechanisms using Burp’s login macros and session handling rules for applications with multi-step login processes.
- Modify request headers to mimic real user agents, accept encoding, and custom tokens required for API access.
- Adjust parser settings to handle non-HTML content such as JSON and XML payloads for accurate parameter detection.
- Customize passive scan checks to suppress false positives related to known-safe frameworks or internal coding standards.
- Integrate browser-based login workflows using Burp’s browser or external browsers with proxy settings to capture complex JavaScript interactions.
Module 3: Executing Automated and Manual Crawling
- Initiate spidering with custom starting points and limit recursion depth to prevent infinite loops in AJAX-heavy SPAs.
- Manually explore client-side routes and API endpoints not exposed through static links, then add them to the site map for scanning.
- Use Burp’s engagement tools to map indirect parameter flows, such as those passed through localStorage or WebSocket messages.
- Validate discovered endpoints by reviewing HTTP response codes, content types, and data sensitivity before scanning.
- Pause and resume crawling to accommodate dynamic content loading, including lazy-loaded components and pagination.
- Compare crawl results across multiple user roles to identify access control gaps in endpoint visibility.
Module 4: Running and Tuning Active Scans
- Configure scan insertion points to target specific parameters, headers, or JSON fields based on threat models.
- Select attack types per endpoint—e.g., SQLi and XSS for input fields, SSRF for URL parameters, and path traversal for file APIs.
- Adjust payload frequency and payload sets to balance detection coverage with request volume and server load.
- Exclude high-risk tests (e.g., blind SSRF, file write payloads) from production scans to prevent unintended side effects.
- Review and filter scan queue entries to remove redundant or irrelevant requests before launching active scans.
- Monitor scan progress in real time to abort or modify tests triggering WAF blocks or application errors.
Module 5: Analyzing and Validating Findings
- Triaging scan results by severity, exploitability, and business impact to prioritize remediation efforts.
- Manually reproduce findings using Repeater to confirm exploit conditions and eliminate false positives.
- Examine time-based vulnerabilities using Collaborator interactions to verify out-of-band exploitation paths.
- Differentiate between reflected, stored, and DOM-based XSS by analyzing payload execution context and data flow.
- Correlate findings across tools—such as ZAP or Nuclei—to validate consistency and reduce tool-specific noise.
- Document proof-of-concept steps including raw requests, response diffs, and reproduction environments for developer handoff.
Module 6: Managing False Positives and Scan Noise
- Adjust heuristic thresholds in active scan settings to reduce overreporting on edge cases like partial SQL syntax matches.
- Flag and suppress findings related to third-party libraries or CDN-hosted assets outside organizational control.
- Use issue tags to classify findings by root cause (e.g., framework limitation, misconfiguration, design flaw) for trend analysis.
- Compare scan results across multiple runs to identify transient issues caused by caching, load balancing, or race conditions.
- Configure Burp’s issue thresholds to auto-suppress low-confidence findings below a defined reliability score.
- Document exceptions for findings mitigated by compensating controls such as WAF rules or input sanitization layers.
Module 7: Integrating Findings into Security Workflows
- Export findings in standardized formats (e.g., XML, JSON) for ingestion into ticketing systems like Jira or ServiceNow.
- Map vulnerabilities to MITRE ATT&CK or CWE identifiers to support risk quantification and compliance reporting.
- Automate report generation using Burp’s command-line interface for integration into CI/CD security gates.
- Share targeted site maps and scan configurations with development teams for local retesting and fix validation.
- Archive project files securely with access controls to meet audit requirements for penetration test evidence.
- Synchronize findings with SAST and SCA results to identify cross-layer vulnerabilities such as insecure API consumers.
Module 8: Maintaining Operational Security and Compliance
- Encrypt Burp project files and disable autosave features when handling sensitive application data.
- Restrict Collaborator server domains to prevent unauthorized DNS or HTTP interactions during scans.
- Sanitize exported reports by removing session tokens, user data, and internal IP addresses before sharing.
- Conduct periodic reviews of scan configurations to ensure alignment with updated application architecture.
- Rotate and audit Collaborator payloads to detect unauthorized usage or leakage in external systems.
- Validate that scan activities comply with contractual obligations, data privacy laws, and industry regulations such as PCI DSS.