⚙️ Burp Suite SetupBurp Suite Setup
# Burp Suite Community Edition (Free)
$ burpsuite &
━━━ Browser Proxy Setup ━━━
Firefox → Settings → Network → Manual Proxy:
HTTP Proxy: 127.0.0.1 Port: 8080
# Burp CA Certificate install (HTTPS intercept)
Browser → http://burp → CA Certificate download
Firefox → Preferences → Certificates → Import Burp CA
━━━ Burp Suite Main Modules ━━━
Proxy → Traffic intercept ও modify
Repeater → Manual request replay
Intruder → Automated payload testing
Scanner → Vulnerability auto-scan (Pro only)
Decoder → Encode/decode data
Comparer → Response comparison
🎯 Proxy — Request Intercept ও ModifyProxy — Request Intercept & Modify
━━━ Request Intercept ━━━
# Intercept ON → Browser-এ action করো → Burp-এ দেখবে
POST /login HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
username=admin&password=test123
# এখানে modify করতে পারো:
username=admin&password=newpassword ← password বদলাও
username=administrator&password=test ← username বদলাও
username=admin&password=test&role=admin ← extra param যোগ
# Forward → request পাঠাও
# Drop → request বাদ দাও
━━━ HTTP History ━━━
# সব requests history-তে থাকে
# Right-click → Send to Repeater/Intruder/Scanner
🔄 Repeater — Manual TestingRepeater — Manual Testing
━━━ Repeater Usage ━━━
# Request modify করে বারবার পাঠাও
# SQLi, XSS, IDOR test করার জন্য সেরা
# Original Request:
GET /product.php?id=1 HTTP/1.1
Host: target.com
# Test 1: SQLi
GET /product.php?id=1' HTTP/1.1
# Response: SQL error? → Vulnerable!
# Test 2: IDOR
GET /product.php?id=2 HTTP/1.1
GET /product.php?id=999 HTTP/1.1
# আলাদা data? → IDOR check করো
# Test 3: XSS
GET /search.php?q=<script>alert(1)</script>
# Response-এ script tag? → XSS vulnerable
💥 Intruder — Automated Payload TestingIntruder — Automated Payload Testing
━━━ Intruder Attack Types ━━━
Sniper: একটা parameter-এ wordlist
username=§admin§&password=test
→ admin, root, user, administrator, ...
Cluster Bomb: দুটো parameter-এ দুটো wordlist (combinations)
username=§admin§&password=§password§
→ admin:password, admin:123456, root:password, ...
━━━ IDOR Test — Intruder ━━━
GET /api/user/§1001§
Payload: Numbers → 1000 to 1100
# Response length filter করো → আলাদা length = data found
━━━ Login Brute Force ━━━
POST /login
username=admin&password=§test§
Payload: Simple list → rockyou.txt top 1000
━━━ Response Analysis ━━━
Status: 302 (redirect) → Login success!
Status: 200 + "Invalid" → Login failed
Length: আলাদা → IDOR data found
📊 Vulnerability Report TemplateVulnerability Report Template
━━━ Professional Pentest Report Structure ━━━
1. EXECUTIVE SUMMARY
- Overall risk rating: Critical/High/Medium/Low
- Total vulnerabilities found: 12
- Critical: 2, High: 4, Medium: 5, Low: 1
2. VULNERABILITY DETAILS
Vuln #1: SQL Injection
─────────────────────
Risk: Critical
CVSS Score: 9.8
Location: /search.php?q= parameter
Description: The 'q' parameter is not sanitized
Evidence: Screenshot of SQL error / data dump
Impact: Full database access, data theft
Steps to Reproduce:
1. Go to http://target.com/search.php?q=1'
2. Observe SQL error in response
Remediation: Use prepared statements (PDO/MySQLi)
Reference: OWASP A03, CWE-89
3. REMEDIATION PRIORITY
Immediate: SQLi, RCE (fix within 24 hours)
Short-term: XSS, IDOR (fix within 1 week)
Long-term: Missing headers (fix within 1 month)
4. CONCLUSION ও RECOMMENDATIONS
🎯 পুরো গাইডের সারসংক্ষেপComplete Guide Summary
- 🔍 Nmap + Nikto + Gobuster → Initial attack surface map করো
- 💉 SQL error / boolean response → SQLi test করো (SQLMap)
- 🔴 Alert popup / script in response → XSS confirm করো
- 🔐 Different error message → Username enum, No rate limit → Brute force
- 🔓 ID change → IDOR, Role change → Privilege Escalation
- 🌐 URL parameter → SSRF, File upload → Webshell
- 🔧 Burp Suite → সব testing-এর central tool
- 📊 সব কিছু document করো → Professional report দাও
🚨 মনে রেখো: এই গাইডে শেখা skills শুধুমাত্র DVWA, WebGoat, TryHackMe, HackTheBox-এর মতো authorized practice platform-এ ব্যবহার করো। Real website-এ permission ছাড়া এই কোনো technique apply করা বাংলাদেশের আইনে কঠোর শাস্তিযোগ্য অপরাধ। Security শেখার লক্ষ্য হলো defend করা — attack করা নয়।
🌐 "Know the attack to build the defense."
Web AppSec v1.0 — 8 Chapters | OWASP Top 10 | সম্পূর্ণ বাংলা গাইড