Source: Bug Bounty Bootcamp by Vickie Li (No Starch Press, 2021)
Use a Unix-based system. Kali Linux is recommended – it ships with Burp Suite, Gobuster, DirBuster, Wfuzz, and other tools. macOS also works fine.
Burp is a web proxy that sits between your browser and the server, intercepting and allowing modification of every HTTP/HTTPS request and response.
Required to intercept HTTPS without certificate errors:
Burp > Proxy > Intercept > click until it reads Intercept is on. Browse to any HTTPS site to confirm requests appear.
Proxy – captures all requests/responses. Modify before forwarding. Right-click to send to any other module.
Intruder – automated payload injection. Use for: brute-forcing passwords, iterating IDs for IDOR, fuzzing parameters.
Repeater – manually replay and modify individual requests. Most-used for exploitation and bypass testing. Right-click any request > Send to Repeater.
Decoder – encode/decode base64, URL, HTML, hex. Use “Smart decode” when unsure of encoding.
Comparer – diff two requests or responses side by side. Useful for comparing auth vs. unauth responses.
Copy as curl – right-click any request > Copy as curl command. Paste into a report as PoC.
Organized notes are how you avoid repeating work and missing chains: