Agenda
1. Introduction to Burp Suite Configuration Library
2. Understanding Burp Suite Scan Profiles
3. Creating Burp Suite Custom Scan Profiles
4. Efficiently detecting vulnerabilities with Custom Scan
Profiles
5. Using Burp Extensions and Open Source tools to detect
vulnerabilities
Introduction to Burp Suite Configuration Library
Burp Suite comes with a range of built-in setting profiles which can
help users to quickly fuzz an application's endpoints.
Crawl options : control Scanner’s behavior during the crawl phase of the scan.
Audit options : control Scanner's behavior during the audit phase of the scan.
Understanding Burp Suite Scan Profiles
https://portswigger.net/burp/documentation/scanner/scan-configurations/burp-scanner-built-in-configs
Creating Burp Suite Custom Scan Profiles
Based on the vulnerability category, we can create as many custom profiles as we require
Such as
● Path Traversal
● XML Entity Injection
● Server Side Request Forgery
● Web Cache Poison
● HTTP Request Smuggling
● Cross Origin Resource Sharing
These custom profiles are incredibly useful when you need to search for vulnerabilities
on specific parameters and endpoints, allowing you to efficiently and effectively detect
any potential vulnerabilities.