Skip to main content

Repeater Tab In Burp Suite

What is repeater tab? 

The Repeater tab in Burp Suite is a powerful tool used to manually modify and resend individual HTTP and WebSocket messages. It allows for fine-grained control and testing of how an application responds to specific inputs.



Key Features:

1.Manual Request Editing:

  • You can manually edit the request method (GET, POST, etc.), URL, headers, and body.

  • This is useful for experimenting with different payloads and parameter values.

2.Tabbed Interface:

  • Each request sent to the Repeater opens in a new tab, allowing you to work on multiple requests simultaneously.

  • Tabs can be renamed for better organization.

3.Send Request and View Response:

  • After editing, click the "Send" button to send the modified request.

  • The response from the server is displayed in the side pane, showing the raw HTTP response, headers, and body.

  • The response can be viewed in different formats: raw, pretty, or hex.

4.Request History:

  • The Repeater maintains a history of the requests sent, which allows you to go back and review or resend previous requests.

  • This is particularly useful for tracking changes and comparing different responses.

Practical Applications:

1.Testing for Vulnerabilities:

  • Insert different payloads to test for SQL injection by altering parameters in a query string or POST body.

  • Check for XSS by adding JavaScript payloads to input fields and seeing if the response contains the payload without sanitization.

2.Parameter Tampering:

  • Modify parameter values to see if unauthorized access can be gained (e.g., changing user IDs to access another user's data).

3.Brute Force Testing:

  • Try different authentication credentials to test the login functionality.

How to use repeater tab:



  • In burp suite you find repeater tab. it looks like that.



  • From the intercept tab you can send the request to the repeater tab. you can right click and click on send to repeater or press Ctrl+R for send request to repeater tab.


 

  • click on repeater to view the request that you send. than click on send button to send request.



  • Now you can see the response in the tab that located in the right side. 



  • From the request tab you can change or modify the request. for example i change google.com to instagram.com



  • The response for the instagram.com is here in the right side.


Comments

Popular posts from this blog

OWASP Top 10 : Understanding Broken Access Control

What is broken access control? Broken access control is a security issue where users can access data or perform actions that they shouldn't be allowed to. This happens when the system fails to properly enforce rules about what users can and cannot do. Types of access controls :  1 . Vertical privilege escalation:  Vertical privilege escalation happens when a normal user gains access to functionalities reserved for higher-privileged users. Example:  A normal user can change the policies of the company.  2. Horizontal privilege escalation:  Horizontal privilege escalation allows a user to switch their access to another user's account, essentially impersonating them. Example:  A normal user can switch their account to admin.  3 . Insecure direct object reference ( IDOR):  IDOR occurs when an application exposes a reference to an internal implementation object, such as a file, directory, or database key. Example:  Suppose...

Installation and use of assetfinder

What is assetfinder ? Assetfinder is a subdomain discovery tool used in Kali Linux, focusing on finding related domains and subdomains for a target. It’s especially valued for its simplicity and efficiency in discovering assets associated with a domain, including subdomains and related domains. Assetfinder is particularly useful during the reconnaissance phase of penetration testing. Uses of Assetfinder in Kali Linux: Subdomain and Domain Discovery:  Assetfinder searches the web to find subdomains and related domains for a target domain. It aggregates data from various sources to provide a comprehensive list of assets. Combining Multiple Data Sources:  The tool integrates with numerous online services and databases, combining their results to give a broader view of the domain’s subdomains. This includes sources like crt.sh , certspotter , hackertarget , and others. Efficient and Quick Enumeration:  Assetfinder is known for its speed and efficiency. It quickly en...

OWASP Top 10 :Understanding Insecure Design

    What is insecure design? Insecure design means creating a system or application without thinking enough about security. These occur when security is not considered or prioritized during the design process, resulting in weaknesses that attackers can exploit. Types of Insecure Design: 1. Lack of Security Requirements:  Not including security requirements during the design phase. Example : Failing to specify that passwords should be stored using strong hashing algorithms. 2. Improper Data Validation:  Not verifying input data properly, Example : Not checking user inputs, allowing SQL injection attacks. 3. Weak Authentication and Authorization:  Inadequate mechanisms to verify user identity and access permissions. Example : Allowing access to sensitive data without proper user verification. 4. Lack of Logging and Monitoring : Not tracking system activities or security events. Example : Not logging failed login attempts, making it hard to detect brute-force attac...