SECURITY/Webhacking

Burp Suite μ„€μΉ˜ 및 μ‚¬μš© - Windows 64 bit

\b\t 2021. 2. 17. 16:44

1. Burp Suite μ„€μΉ˜ν•˜κΈ°

νŠΉλ³„ν•œ λ‚΄μš© μ—†λ‹€. κ·Έλƒ₯ μ„€μΉ˜ ν”„λ‘œκ·Έλž¨ λ‹€μš΄λ°›κ³  μ„€μΉ˜ν•˜λ©΄ λœλ‹€.

μ΅μˆ™ν•˜μ‹  뢄듀은 패슀~

 

1) 곡식 μ‚¬μ΄νŠΈμ— λ“€μ–΄κ°€μ„œ λ‹€μš΄λ°›λŠ”λ‹€.

(Community 2021.2.1 을 λ‹€μš΄λ°›μ•˜λ‹€. κ°€μž₯ μ΅œμ‹ κΊΌ)

 

2) λ‹€μš΄λ°›μ€ νŒŒμΌμ„ μ‹€ν–‰μ‹œμΌœμ„œ μ„€μΉ˜ν•œλ‹€.

3) 끝.

 

 

2. Burp Suite μ‚¬μš©ν•˜κΈ°

 

1) Burp Suite Community Edition μ‹€ν–‰

 

 

2) Proxy 섀정을 ν•΄μ€€λ‹€.

Proxy -> Options -> Interface μ—μ„œ 127.0.0.1:8080 으둜 μ„€μ •ν•΄μ€€λ‹€.

 

또 내렀보면 Intercept Clinent Requests λž‘ Intercept Server Responses κ°€ μžˆλŠ”λ° λ‘˜λ‹€ 체크해쀀닀!

 

 

3) μ‚¬μš©ν•˜λŠ” μ›ΉλΈŒλΌμš°μ €μ—μ„œ Proxy 섀정을해쀀닀. 

3-1) Chrome & Window 10

 

컴퓨터 ν”„λ‘μ‹œ μ„€μ • μ—΄κΈ°μ—μ„œ μˆ˜λ™ ν”„λ‘μ‹œ 섀정을 ν•΄μ€€λ‹€.

(μœ„μ— 해놓은 것과 같은 μ •λ³΄λ‘œ)

 

(주의! μ €μž₯ κΌ­ λˆ„λ₯΄κΈ°.)

 

 

4) Porxy -> Intercept μ—μ„œ Intercept is on μƒνƒœμ—μ„œ Request/Response λ₯Ό Intercept ν•  수 μžˆλ‹€ ~~

 

 

Request λ₯Ό ν•˜κ³  λ³€μ‘°ν•  게 있으면 λ³€μ‘°μ‹œν‚¨ 뒀에 Forward λ₯Ό λˆ„λ₯΄λ©΄ λœλ‹€ γ…Žγ…Ž

 

ν”„λ‘μ‹œλ₯Ό 열어두고 μ›ΉλΈŒλΌμš°μ €λ₯Ό μ‹€ν–‰μ‹œν‚€λ©΄ νŽ˜μ΄μ§€ λ‘œλ”©μ΄ μ•ˆλ˜λŠ”λ°, 이게 λ°”λ‘œ Request λ₯Ό intercept ν•œ 것이닀.

μ›ν•˜λŠ” 것을 μ‹€ν–‰ν•˜κ³  forward λ₯Ό ν•΄μ£Όλ©΄μ„œ ν”„λ‘μ‹œλ₯Ό μ΄μš©ν•˜μž ~

 

또 ν•œ κ°€μ§€! 

Burp Suite λŠ” 기본적으둜 https λŠ” μ•ˆλœλ‹€.. 접근이 μ•ˆλ¨.

μ΄κ±°λŠ” λ”°λ‘œ μ„€μ •ν•΄μ€˜μ•Ό ν•œλ‹€ (μΈμ¦μ„œ)