DEV Community

Cover image for Day 5: Burp Suite Deep Dive for Beginners — Scanner, Intruder, Decoder & Your First Real Vulnerability Test (2026)
Mr Elite
Mr Elite

Posted on • Originally published at securityelites.com

Day 5: Burp Suite Deep Dive for Beginners — Scanner, Intruder, Decoder & Your First Real Vulnerability Test (2026)

📰 Originally published on SecurityElites — the canonical, fully-updated version of this article.

Day 5: Burp Suite Deep Dive for Beginners — Scanner, Intruder, Decoder & Your First Real Vulnerability Test (2026)

DAY 5 OF 60
BUG BOUNTY MASTERY COURSE
FREE — ALL 60 DAYS

View Full Course →

🟢 Day 5 — Burp Suite Deep Dive

Day 60 — Pro Hunter $$$$

← Day 4: OWASP Top 10

Day 6: Sub Domain Enumeration →

Days 1–4 Quick Check
By now you should have: a HackerOne account with a program selected, Burp Suite installed and working with Firefox + FoxyProxy + CA certificate, core HTTP knowledge (methods, status codes, cookies, SOP), and all 10 OWASP categories memorised. If you’re missing any of these — do the earlier days first. Day 5 builds directly on the Burp Suite setup from Day 2.

05

On Day 2 you installed Burp Suite and intercepted your first HTTP request. That was the introduction. Today is the masterclass. Every professional bug bounty hunter — every single one who earns consistently — lives in Burp Suite. They know its tabs the way a surgeon knows their instruments. Not just what each tool does in theory, but exactly when to reach for it and how to use it to get the result they need.

Today you will learn every major Burp Suite tab in operational depth — not surface-level descriptions but actual workflows. Scanner, Repeater, Intruder with all four attack types, Decoder, and Comparer. Then you will use everything you just learned to find a real vulnerability in a practice environment. By the end of this session you will have demonstrated your first web vulnerability — a finding that, in a real bug bounty programme, would earn you a real bounty.

This is the burp suite tutorial for beginners that professional hunters wish they had when they started. No skipped steps. No assumed knowledge. Let’s go.

📋 Day 5 Contents

  1. Burp Suite Interface Overview
  2. Step 1 — Proxy & HTTP History
  3. Step 2 — Repeater (Deep Dive)
  4. Step 3 — Intruder: All 4 Attack Types
  5. Step 4 — Decoder: Encoding & Decoding
  6. Step 5 — Comparer: Diff Two Responses
  7. Step 6 — Scanner: Passive vs Active
  8. Step 7 — Find Your First Vulnerability
  9. The Professional Burp Workflow
  10. Day 5 Task + Challenges

Burp Suite Interface Overview — All the Tabs, All Their Purposes

When Burp Suite opens, beginners are often overwhelmed by the tab bar. Every professional hunter has had that moment of “where do I even start?” Let’s eliminate that feeling permanently with a clear map of every major component and its exact role in a bug bounty workflow.

securityelites.com

B

Burp Suite Community Edition — Temporary Project

Proxy

Repeater

Intruder

Scanner

Decoder

Comparer

Sequencer

Target

Logger

USE DAILY
PROXY
Intercept & History. Your window into all browser traffic. Set Intercept ON to pause requests, OFF to passively capture them.

USE DAILY
REPEATER
Manually modify and resend any request. Your primary testing workspace — tweak parameters, headers, bodies and observe how the application responds.

POWERFUL
INTRUDER
Automated payload delivery. Send a wordlist through any parameter. Used for brute force, fuzzing, and enumeration. 4 attack types covered today.

SCANNER
Passive (free): analyses traffic already captured. Active (Pro only): actively sends attack payloads to find vulnerabilities automatically.

DECODER
Convert between encodings: Base64, URL, HTML, hex, gzip. Decode JWT tokens, cookies, hidden fields. Essential for understanding obfuscated data.

COMPARER
Side-by-side diff of two requests or responses. Find the exact difference between a successful login and a failed one — crucial for authentication testing.

Burp Suite Interface Map — The three tabs highlighted with colour borders (Proxy, Repeater, Intruder) are the ones you will use in every single testing session. Decoder and Comparer are used frequently but situationally. Scanner passive mode runs automatically. All covered in depth today.

STEP 1 Proxy and HTTP History — The Foundation of All Testing

The Proxy tab has two operational modes that you will switch between constantly. Understanding when to use each is the single most important Burp Suite habit to build from Day 5 onwards.

INTERCEPT OFF — Browse Mode
Browser works normally. Every request still flows through Burp and appears in the HTTP History tab — but nothing is paused. Use this mode for initial reconnaissance and mapping the application’s surface. Browse the entire target with Intercept OFF first, then use History to pick interesting requests for testing.
Use for: initial mapping, passive capture

INTERCEPT ON — Pause Mode
Every request pauses in Burp before reaching the server. You read, modify, or drop it, then click Forward. Use this when you want to intercept and modify a specific request in real time — for example, to change a parameter the moment you click a button in the browser.
Use for: real-time modification, specific requests

📋 HTTP History — Your Hunting Ground

Every request in HTTP History is a potential finding. Here is the professional’s approach to reviewing History:

1.
Filter by Method = POST — POST requests submit data and are primary injection targets

2.
Filter by URL contains “id” — any parameter containing an ID is a potential IDOR target

3.
Look for status codes 302 redirects — redirects can indicate authentication bypasses

4.
Look for large response sizes — unusually large responses may contain more data than intended


📖 Read the complete guide on SecurityElites

This article continues with deeper technical detail, screenshots, code samples, and an interactive lab walk-through. Read the full article on SecurityElites →


This article was originally written and published by the SecurityElites team. For more cybersecurity tutorials, ethical hacking guides, and CTF walk-throughs, visit SecurityElites.

Top comments (0)