source;
As someone who has been solely involved in science-related practices, choosing cybersecurity as another career path to me is a bit outrageous, but I only gave it my thoughts after the deeds had been done.
From secondary school I dreaded data processing and found the course frustrating to grasp, maybe because it was mostly the theoretical aspect with no practical to clarify what was going on.
But this time things took a different turn.
We didn't just learn we also practiced.
And that changed my approach about computer related practices
Have you ever wondered what went on when you typed something into your search engine?
For example, you searched for New York and get to see different views on images, maps, websites, etc.
No, right?
But behind the scenes, your browser is sending requests to a server, and the server is responding with data.
Personally, I never gave it any thoughts until I got introduced to Burp Suite.
Burp Suite acts like a middleman between your browser and the internet.
Instead of your request going directly to the server, Burp intercepts it, allowing you to see exactly what is being sent.
For the first time, I could see the raw requests, the parameters being sent, the structure of the data, and how the server responds.
I moved from just using the internet to intercepting responses using Burp Suite.
As unrealistic as it sounds, I will prove this to you in the next few reads.
Besides intercepting and inspecting traffic, Burp Suite is also used for modifying requests, finding vulnerabilities (which is really important in cybersecurity), automating attacks (Intruder), API testing, etc.
If you are a cybersecurity student and you didn't understand how to use Burp Suite for intercepting a message, here's a guide, or if you just want to see how it works, you could try it.
The results are really fascinating.
Download your Burp Suite from your web browser.
After proper installation, you start up your Burp Suite.
This is what the Burpsuite interface looks like.
We will be working with the proxy tool, so you click on proxy.
On this page you get to see options like intercept,http history, web socket history and others.These are used to monitor
At the top right corner, you will find the built-in browser. This is the browser you should use instead of your regular web browser, because it is already configured to work with Burp Suite.
Ensure your intercept is turned ON, then open your browser and Search for Paris
Go back to your burp Suite;
You will notice that the request has been intercepted, and the raw data of the request is displayed. This includes the parameters being sent to the server.
Locate the places where Paris appears in the request and change it either to Newyork or Australia;
After making the changes; on the top you will see forward- click on it and forward all messages.
This modifies the request and sent to the server; Once you are done turn off your intercept .
This intercepts your original message in the search engine and receives the modified value you inserted.
This shows how Burp Suite allows you to intercept and manipulate requests before they reach the server—one of the key steps in testing for web vulnerabilities.