Burp Scanner can be used as both a fully automated scanner and a powerful means of augmenting your manual testing workflow. The list of vulnerabilities that Burp Scanner can detect is constantly growing. We work closely with our world-class research team to make sure that it stays up to speed with the latest techniques for finding both classic bugs and newly discovered vulnerabilities alike.
Scanning a website involves two phases:
Burp Scanner is only available in Burp Suite Professional and Burp Suite Enterprise Edition. If you're using Burp Suite Community Edition, then you won't be able to follow this tutorial.
Burp Suite Enterprise Edition users should see our tutorial on running your first scan with Burp Suite Enterprise Edition.
In this section, you'll learn how to launch your first automated vulnerability scan.
Go to the Dashboard tab and select New scan.
The Scan launcher dialog opens. This is where you can adjust various settings to control Burp Scanner's behavior.
In the URLs to scan field, enter ginandjuice.shop. Leave all the other settings as their default for now.
Using Burp Scanner may have unexpected effects on some applications. Until you are fully familiar with its functionality and settings, you should only use Burp Scanner against non-production systems. Do not run scans against third-party websites unless you have been authorized to do so by the owner.
Select Scan configuration. From here, you can fine-tune many aspects of Burp Scanner's behavior to suit different use cases and target sites.
Make sure that Use a preset scan mode is selected and click Lightweight. The Lightweight scan mode is intended to give a very high-level overview of a target as quickly as possible. Scans using this mode run for a maximum of 15 minutes.
Click OK to launch the scan. Burp Scanner begins crawling from the URL you entered in the previous step.
Notice that a new task has been added to the Dashboard to represent this scan. This displays some key information, such as the phase of the scan that is currently running, how many requests have been sent, and so on.
While your scan is running, proceed to Step 5.
Go to the Target > Site map tab and notice the new entry for ginandjuice.shop. Expand this node to see all of the content that the crawler has managed to discover so far. If you wait a few seconds, you'll see the map being updated in real time.
Monitor the scan's status in the dashboard. After a minute or two, the crawl will finish and Burp Scanner will begin auditing for vulnerabilities. As it finds issues, these will be displayed in the Issue activity panel on the Dashboard tab.
If you select an issue, you can see an Advisory tab, which contains key information about the issue type, including a detailed description and some remediation advice. Next to this are several tabs that provide evidence that Burp Scanner found for this issue. This is typically a Request and Response but will differ depending on the issue type.
In this section, you'll learn how to generate a report based on your scan results.
Go to the Target > Site map tab, right-click on the entry for https://ginandjuice.shop, and select Issues > Report issues for this host.
A wizard guides you through various options, such as which file format to use, how much detail to include, and so on. For now, just click Next to accept the defaults until you're prompted to enter a filename and location for the report.
Click Select file and choose a location where you want to save the report. Enter a name for the file.
You must include the appropriate file extension, in this case, .html.
Click Save and then Next to generate the report.
Open the report in Burp's browser to see what it contains. This is useful for reporting the results of your scans to colleagues or clients.
You've just performed your first scan using Burp Suite and generated a report of your findings.
Next step - Continue learning about Burp
CONTINUE