Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Security › Web Application Penetration Testing with BurpSuite – Part 2

    Web Application Penetration Testing with BurpSuite – Part 2

    By Vikram Singh RaoDecember 3, 2022
    Facebook Twitter Reddit LinkedIn
    Burp-Suite

    This article covers basic/intermediate HTTP stuff that is a prerequisite for understanding how attacks work.

    I hope that you have gone through part 1 of this article series Web Application Penetration Testing with BurpSuite -Part 1.

    Now before we dive deep, it is really necessary to brush the basics up. Whether you are a newbie to this HTTP stuff or you already know a bit, the following content will work both as a memory refresher as well as a comprehensive information source.

    So, HTTP is an application layer protocol, it simply means that application software mostly uses this protocol(like web browsers, download managers etc). In complex terms, it means that HTTP lies on the application layer of the TCP/IP protocol suite.

    HTTP works in a request-response architecture(as described in the previous article). There are some important headers which you should know about before getting started.
    Before everything, take a look at this, this is a typical request and its response. It will be of great help.
    Here is the HTTP request sent by your browser when you type “google.com” in your web browser’s address bar.

    GET / HTTP/1.1
    Host: google.com
    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:48.0) Gecko/20100101 Firefox/48.0
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
    Accept-Language: en-US,en;q=0.5
    Accept-Encoding: gzip, deflate
    Connection: close
    Upgrade-Insecure-Requests: 1
    

    And the response from Google’s web server:
    Burp_response

    As you can see the response has two parts-header and content. The content part is signifying that google.com is permanently moved to www.google.co.in towards which our browser will be redirected as our browser will make a request to the mentioned URL in the subsequent course of requests.

    Methods: are ways which specify various parameters to be followed during communication. For example in the above request, our method was GET, which is used to retrieve a web page from a server as-is.
    There are many other methods including:

    POST

    Used to send some data to the web server for evaluation. For example your login data as username and password. The corresponding data may or may not be already present on the server.

    PUT

    PUT is used to store some data on the server. For example, when you send the signup data to your web server, the corresponding request uses the PUT method.

    OPTIONS

    This header requests the server to respond with available and valid methods on that server. For example on some servers all the communication is done with URL itself, so GET method will always be used. In this case, sending a request with OPTIONS method will result in a response telling that only GET method is supported.

    HEAD

    It is similar to the GET method except that the server will not send the content. This header is used to check for availability of a resource before a GET request can be made.

    TRACE

    The server returns the request body in its content part. This is used to check whether proxies(intermediate servers) are modifying the original request in any way.

    So, this is it for now, in the next article I’ll cover status codes, caching and some more important headers.
    Do ask your doubts and queries in the comments or pm me on my page.

    P.S. If you are serious about web app most pent, then I highly recommend this book: The Web Application Hacker’s Handbook.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Vikram Singh Rao
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    I am an entrepreneur at heart who has made his hobby turned a passion, his profession now.

    Related Posts

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    Comparing Traditional vs. Digital Metrology Tools

    June 27, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024
    Lists You May Like

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.