

You now need to specify a manual proxy that Burp will be interacting with. Then, scroll down and you should see Network Proxy select this. To do this in Firefox, open the Hamburger menu in the top right of the browser and select preferences. You’ll then need to set up your web browser to accept intercepts from Burp. We’re using Firefox, as it interacts best with Burp. First of all, enter the IP address in to your web browser. In this example, we’re going to be using Burp in a test environment using the IP address 10.1.1.102. In this demonstration, we’ll go through the basics in 5 steps: Burp is used for multiple tasks, but its primary purpose is to use the information gathered with other tools to test the vulnerabilities of the web application being pen-tested.

BurpSuite, also known as Burp, is an industry standard penetration testing tool. In this video guide we’ll be covering the basics of BurpSuite, the web-application proxy.
