Performing exfiltration using Burp Suite

Execute the following steps to perform data exfiltration using Burp Suite:

  1. First, configure Burp Suite to intercept the request made by the application, and stop when the request which sends the $id value, using the Intercept is on option in the Proxy tab, as shown in the following screenshot:
  1. Once the request is stopped, right-click on it, and select the Send to intruder option, as follows:

By default, Burp Suite creates wildcards for each variable detected in the request and creates values in the ...

Get Hands-On Application Penetration Testing with Burp Suite now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.