The document discusses using custom scan profiles in Burp Suite to efficiently detect web application vulnerabilities. It introduces Burp Suite's configuration library and built-in scan profiles. It then explains how to create custom scan profiles tailored to specific vulnerability categories. The document demonstrates how custom profiles can efficiently detect vulnerabilities by focusing scans on particular parameters and endpoints. It also discusses extending scanning capabilities through Burp extensions and open source tools.
3. Agenda
1. Introduction to Burp Suite Configuration Library
2. Understanding Burp Suite Scan Profiles
3. Creating Burp Suite Custom Scan Profiles
4. Efficiently detecting vulnerabilities with Custom Scan
Profiles
5. Using Burp Extensions and Open Source tools to detect
vulnerabilities
4. Introduction to Burp Suite Configuration Library
Burp Suite comes with a range of built-in setting profiles which can
help users to quickly fuzz an application's endpoints.
Crawl options : control Scanner’s behavior during the crawl phase of the scan.
Audit options : control Scanner's behavior during the audit phase of the scan.
5. Understanding Burp Suite Scan Profiles
https://portswigger.net/burp/documentation/scanner/scan-configurations/burp-scanner-built-in-configs
9. Creating Burp Suite Custom Scan Profiles
Based on the vulnerability category, we can create as many custom profiles as we require
Such as
● Path Traversal
● XML Entity Injection
● Server Side Request Forgery
● Web Cache Poison
● HTTP Request Smuggling
● Cross Origin Resource Sharing
These custom profiles are incredibly useful when you need to search for vulnerabilities
on specific parameters and endpoints, allowing you to efficiently and effectively detect
any potential vulnerabilities.