Web App Penetration Testing - #3 - Brute Force With Burp Suite
Вставка
- Опубліковано 5 лют 2025
- Hey guys! HackerSploit here back again with another video, in this video series we will be learning web application penetration testing from beginner to advanced.
Burp or Burp Suite is a graphical tool for testing Web application security. The tool is written in Java and developed by PortSwigger Security.
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
🔗HackerSploit Website: hsploit.com/
➡️HackerSploit Android App: play.google.co...
Support The Channel✔️
Pure VPN Affiliate Link:
PureVPN: billing.purevp...
Patreon: / hackersploit
➡️Get Our Courses✔️
📗 Get Our Courses at $10 Only!
The Complete Deep Web Course 2018:
www.udemy.com/...
✔️SOCIAL NETWORKS
-------------------------------
Facebook: / hackersploit
Instagram: / alexi_ahmed
Twitter: / hackersploit
Kik Username: HackerSploit
Patreon: / hackersploit
--------------------------------
Thanks for watching!
Благодаря за гледането
感谢您观看
Merci d'avoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
You can contact me on my social networks or through the HackerSploit website.
✔️SOCIAL NETWORKS
-------------------------------
Facebook: facebook.com/HackerSploit/
Instagram: instagram.com/alexi_ahmed/
Twitter: twitter.com/HackerSploit
Kik Username: HackerSploit
Patreon: patreon.com/hackersploit
--------------------------------
hsploit.com
HackerSploit Video on WAF please
How to use Burp through Tor?
Please I need 🙏 chart with you
😊
This is awesome, I've been wanting to learn Burp Suite but I was always confused by different options it had. This guy makes it simple and explains what's happening on the application side as well.
You are really making the world a better place by helping other people to understand very important materials.
i would like to say tq for the explanation..I've been searching bruteforce tutorial using bupsuite n finally found it n this is the best tutorial
What else can I say? Another excellent presentation and lecture on a subject so interesting that even someone without the basic IT knowledge can master easily and in a short time.
Thank you very much for the support, I really respect your opinion. Thank you.
Great work hakersploit. Keep bringing more of this series. Thanks!
This tutorial was EXceLENT!!
Brief and accurate. Needs such tutorials. Thanks 😊😊😊😊
For those who don't find the metasploit wordliste at the same folder:
/opt/metasploit-framework/embedded/framework/data/wordlists/
Thank you for this good video.
Thank you sir. I am a beginner, your explanation is very understandable.
you are the word best hacking teacher i am Indian love you bro your voice is too good
One Of The Most Video I'hv Ever Seen! 😍😍😍
Awesome content man! Thank you for taking the time for creating this free content. It was worth my time
Thanks sir you are great i learn every thing from you
Excellent explaination 🤟
Big fan bro💕🖤
nice and simple explanation! where can i find the remain series of dvwa on your channel
If someone is having issues in DVWA traffic being not intercepted(provided you are running it on local host and not metasploitable 2), change the default settings of network.proxy.allow_hijacking_localhost to true. It can be changed by typing about:config in the browser address bar.
very nice Also guys Keep in mind that you can use something like cuppy or crunch to generate your own Password lists based on some key Attributes of a potential victim. So for example if you know the Name, the birthday, partner's Name or pet's Name of a Person or you know that he tends to like certain Things like Football, then you can generate a Password list based on These Attributes.
Good job done.Thank you!
thankyou this video help me understand it
Excellent
Thank you for this good work
i liked wt u said at 6:20 , awesome man xD
helpful info thanks
excellent sir thank you so much
Thanks for the video =)
Great video! One minor correction: irregardless isn't a word, regardless is what you are looking for.
thanks for correcting ..without your out of this world knowledge of words and grammar this video was complete bs.
thanks again
@@mayankmani552 I think Z. Minor meant it well and wasn't being a troll. Every time I hear someone say that word I want to do the same and correct...but out of fear of being flamed for trying to help the person I don't. I don't think it's about showing ones intelligence, it's about trying to help people improve. If you don't agree, oh well. I think HackerSploit's content is some of the best on YT and I'm a huge fan/supporter...but we can all use a quick tip now and then. Respectfully.
@@RandyandPetraJ I am sorry I am a better person now
@@mayankmani552 I am sorry you're a better person too. LOL...you see how that worked? You forgot a comma...and in this situation, I'm NOT trying to help you be better, actually pointing out your ignorance and childish attitude.
this is great you can make more videos about b suit
Observed you don't have to login authentication using burp but just intercept. Intruder can do more than usual, directory traversal, etc, glad that I learn the different attack type like cluster bomb.
Perfect
i like your video your video and your simple english boost helping me so fast thank you
Welcome
thanks man
Love you man.
that's really interesting....thanks ..it's eventually understandable and knowledgable.
:)
much love brother........😍
Hi HackerSploit, wondering when you plan on releasing playlist for OSCP!! Please let us know.
Love it
Nice
Thanks
Great!
Make real world advanced course !
THANK YOU MAN
Thank you a lot. I appreciate the theoretical info and the detailed explanations. I have a question - why do we use localhost as a proxy?
Hello
If I guess on a site and it gives me many post and GET and you know (every post and GET has a request and a response), can I guess for example in a first request post and i got a response that showing third GET?
I think it can be done via Macros but i cant make it. Can you explain the steps if you know
Hey Hackersploit , can we use crunch tool to bruteforce since in real life harder examples , we will never find such easy passes
Can you please tell us how to identify the attack is done by observing log values at the bottom ? I mean which are the features of brute force attack collected in header section in the bottom of burp?
amazing tutorials
I'm having issues in DVWA traffic being not intercepted. How could I do this, please help
Sir plz upload other some vidios on burp.
How to hack call of duty? Just kidding man great video!👍
scared me for a sec
i thought u were a kid. whos asking to hack call of duty...///
Hi There Hackersploit. I have a request ive been trying to get my hands on maybe you might be of help. Im looking for ways to test aws security measures of an instance. Would you have any ideas to go about it? The test would be performed on a ec2instance, or a ebs or s3 storage instance. Either way would be nice to showcase tools on doing the test. Aws pentesting seems to be a new thing and not a lot of knowledge is out there at the moment. If you did a tutorial, it will surely teach lots of people like thanks. Viva Kenya!!!
Sir make videos on high security
Thanks dude...but keep them regularly
IAM not getting the requests at burpsuite sir can you help me out
good
Wo nice
Osm sir
I have an issue while setting up firefox proxy. It says that proxy server is refusing connexions what should i do ?
My password has a "#" in it and whenever I put it in the output of the computer always shows "23$" in place of the hashtag and then everything else normal, is mine like invisible I don't understand.
render under response is blacked out for me any tips????
Sir i need help
I got response when click intercept ON.but the response connection is closed and the entered username & password is not shown in response
I already installed CA certificate and i do all thongs u do.
Where is the spidering practical video. You just told the theory and #3 should be Spidering practical example.
Sourav Purkait I was thinking the same thing?
ua-cam.com/video/97uMUQGIe14/v-deo.html
@@TheZayrax Thanks for the link
Spider tab is removed in latest versions
@@drumildeshpande They removed the "spider" tab so you can do it in the "dashboard" tab, with the function "new scan" but its useless since its only for professional edition. Do one thing, uninstall the burp you are having and install version 1.7.30 - good luck
I need help i installed kali linux on my USB and I did full updated kali linux and now my cursor won't move I can see my desktop but cursor is frozen
please make a series on xss for website hack
Can you make a video on mousejacking?
I need help when i tried to write user And password like You like test and 12345 to see result in intecept but it doesnt extract anything
Mee too I have this problem
Where is episode 4?
Why is the username and password the same for all security levels in DVWA?
newbie question... will captacha prevents brute force attacks?
yes
It depends :Yahoo use captcha but you can bruteforce it
Hi, thank you for all your instructive vidéos, i have a problem with the proxy settings on chrome, when i set it to local host and put the intruder on, i have a warning from chrome on the other machine telling me that someone is trying to intercept the data then when i stop the intruder it works normaly.
of course it will detect any interception,should be happy that it secure you....
Hello, I have a problem: The "HTTP History" tab does not log all the websites that I access using the firefox browser, only the first one. How can I fix it? Thanks!
Can you make more videos for the windows linux subsystem? I downloaded it trough your video but I dont really know what to do with it and what the possibility's are.
As soon as I set up those proxies my internet doesn't load any website... What am i doing wrong?
You are using a proxy. That's why. You need to go back and set to "No proxy".
actually your intro music llok like babgbros music
It's cool, the only problem is my brup suite having trouble intercepting localhost, even though I did what the teacher said in the video, but all I got is a success.txt HTTP/1.1, then I google it and turn the network.captive-portal-service.enabled off, then I got nothing back. I thought it might be the problem with firefox, so I downloaded a chrome on my kali and used the 127.0.0.1 as my proxy , but I still got nothing in burp suite. I have no idea how to deal with this problem, dose anyone knows about it? I'll be very thankful.
Did you get the solution. also having the same issue,
Lovelyy
❤❤❤
How to bypass the brute forcr protection? Please help
Need help: why can't I just access the metasploitable ip adress from my main machine? Why do I have to install another kali virtual machine?
You can access metasploitable from your main machine, but they need to be on the same network. Change the vm network mode to bridge mode and try to ping it from your main machine.
@@tyl3rsec301 I have my adapter mode: bridged adapter, but it's still not working. I have a problem loading this page and then(2min) connection timed out.
@@dovahkiinvokul9073 have you tried to ping the machine?
@@dovahkiinvokul9073 if you are able to ping but can't access it from the browser, check metasploitable apache2 service status.
@@tyl3rsec301 looks like I had so simple understanding of how it all works, after doing some research I was able to creare a host-only adapter and all worked fine, thank you for your help.
2021 😊
which network to chose NAT or BRIDGED to get ip address in metaspolitable 2.0 in virutual box
It's better if you use NAT. But BRIDGED will work too as in the case of this video.
@@kevinl.9657 thanks👍
Does it works on https
If you are unable to find the wordlist:
#find / -name wordlists
please can make a video on how to install dvwa because i have try it mean time it not work for me
hello kali mam ..
have you installed dvwa yet?
Do you still have that discord server?
hello how do I create a backdoor DNS in a jpg file and send it by email?
Doesn't brute force create noise in the network???
Can we get tracked easily??
depends if login attempts are being logged. Basic answer is yes. Higher level security systems will track authentication attempts and will lock you out after so many attempts. Also, yes, the ip address and its' related source packets would be captured. So unless you're using a proxy, your public ip would be logged and tracing could be performed.
ryan panovsky thank you
Great video, I've used DVWA in the web security dojo by Maven security, here's the link sourceforge.net/projects/websecuritydojo/ for anyone interested. Here's a video suggestion for you, how about a series on IP TABLES, I think this would go a long in teaching peeps how to harden their systems, just a thought. Keep up the good work!!
why are we using proxy in browser?
why we need to do that?
it basically connect the burp with your browser
I wish there was a translation in this video
whoops let me just go here and then whoops that should have worked but I will go in and whoops here we go I will disable this and now whoops I think I need to refresh and here we go whoops
how do black hat hackers stay anonymous when they Bruteforce webpage?
use VPN, Proxy, Public internet, etc.
please can you improve your video quality?
first#
Third
#NotificationSquad
Sir how we create own phishing page
burpsuite want 400$ to unthrottle cracking. Hydra is free and faster than community. lmk if u know something better pls
first
#NotificationSquad
for all biggeners ,dont listen to this videos its all old and not working anymore
thanks