Using Burp Suite Extender
Burp Suite offers a way to extend the capability of its tools through Burp Suite Extender. You can do this by writing your own extensions in Java, Python, and Ruby, or by installing existing extensions already available for use. This section will show you how to install and use the latter.
Note
If you are interested in building your own extensions, refer to the documentation at https://portswigger.net/burp/extender/.
Getting ready
To use Burp Suite to perform web application analysis against a target, you will need to have a remote system that is running one or more web applications. In the examples provided, an instance of Metasploitable2 is used to perform this task. Metasploitable2 has several preinstalled vulnerable web applications running on the TCP port 80
. For more information on setting up Metasploitable2, refer to the Installing Metasploitable2 recipe in Chapter 1, Getting Started. Additionally, your web browser will need to be configured to proxy web traffic...