Advanced Web Attacks and Exploitation: Figure 20: Burp Suite Repeater Previous Request and Response
Advanced Web Attacks and Exploitation: Figure 20: Burp Suite Repeater Previous Request and Response
We can now switch to the Comparer tab, where Burp Suite has automatically highlighted our
different responses in their respective windows. At this point, we have the option of comparing
the responses for differences in Words or Bytes. We will choose the Words option (Figure 22)
since this example does not include a binary response.
Burp Suite displays the comparison results in a dedicated window (Figure 23), highlighting each
change with color-coding for Modified, Deleted, and Added.
In this example, Burp Suite highlighted Modified and Deleted differences between the two
responses. We previously identified the change to the Access-Control-Allow-Origin value, but
Comparer has also highlighted that the Vary and Access-Control-Allow-Credentials headers are
present on the first response but not on the second.
While this is a very simple example, it shows how the Repeater and Comparer tools can be
extremely valuable when testing a web application.
The Inspector tool is useful for quickly decoding common types of encoding within the HTTP
history tab. Burp Suite’s Decoder tool is a more-powerful version of the Inspector tool. Let’s try it
out by right-clicking on the highlighted text and selecting Send to Decoder.
Now if we switch to the Decoder tab, we can choose the Decode as option to the right and select
Base64 for the encoding scheme (Figure 26).
As a result, a second textbox with the decoded value opens below our original data.