Burp Suite User Forum
For support requests, go to the Support Center. To discuss with other Burp users, head to our Discord page.
I have completed the lab but it is showing Unsolved. (Stored XSS into HTML context with nothing encoded) in this lab. Please look into it.
While doing this lab, when i login, after this request (GET /oauth-callback HTTP/1.1), the website is unable to send the (POST /authenticate) request. I tried in mozilla and Chrome. Whenever the oauth-callback request is...
Hello, I am working on the lab "Host validation bypass via connection state attack," which requires sending two HTTP requests over a single connection to trick the server into believing that both requests are directed to...
Hi all, I was doing the blind conditional SQL injection lab here. I wanted to program my own Intruder essentially, because the community Intruder is slow, and the lab has to bruteforce password letter by letter. I...
My employer purchases a Burp Suite Pro license for me annually. This year, I would like to explore bug bounty and I am curious whether PortSwigger allows license holders to use the same license on their personal installation...
<style> iframe { position: relative; width:500px; height: 700px; opacity: 0.0001; z-index: 2; } .firstClick, .secondClick { position: absolute; top:420px; left:60px; z-index: 1; } ...
Hi im trying to solve this lab : Lab: SameSite Strict bypass via sibling domain here s My script : <script> // Create a new WebSocket object that points to /chat endpoint var webSocket = new...
Hi,I just started learning cyber security and came across these labs. i started with csrf labs and i understood their concept but when viewing the exploit it doesnt change the email but when i deliver it to victim it's says...
no matter how i tried new version, old version, pro one or community i find my self facing this does anyone knows how to fix it or why it's happening https://prnt.sc/i8_003jPkqnU
Hi, I have a macro defined to do this but how do I know if it is actually working from the Macro ui? Should i see it as a derived parameter when I test or re-analyze with macro editor? Thank you Patrick
I'm trying to change the value of a cookie using the Burp option, "Match and Replace". Here is my configuration: Item: Request header Match: cookieName:.*; Replace: cookieName:myValue; Type: Literal. Unfortunately, it...
Hello, I am wondering if the labs are really vulnerable or there are some other checks? I was trying to solve the Blind SQL injection with out-of-band data exfiltration lab and as a first step I just wanted to check the...
I am using Burp Browser, and I have enable third-party cookies to make the exploit works. Here is the code that I'm using: <head> <style> iframe { position:relative; width:500px; height:800px; opacity:0.1;...
I have a problem with "no more activations allowed". Can I get assistance?
I have a problem with "no more activations allowed". Can I get assistance?
Hello Portswigger team. I am not able to complete the above lab.I tried the payload in the solutions. <iframe...
Hello, I was asking for help on a specific problem trying to solve the JWT lab: authentication bypass via algorithm confusion, basically I can achieve all the steps except the last one which is to sign the JWT token with the...
The final step of the LAB I am not getting the 302 response in practical lab. Is anything I am missing. On the "Payloads" tab, add the list of numbers in payload set 1 and add the list of passwords to payload set 2....
How can i reset all my labs, I feel fogot how to solve them and wanna learn again
Dear PortSwigger Team, I am currently working on a lab exercise that is vulnerable to a null origin CORS vulnerability. According to the lab instructions, we need to exploit this vulnerability by crafting an iframe and...
Page 11 of 332
Your source for help and advice on all things Burp-related.