Modify Requests

Step 1: Create an HTTP Endpoint

To get started, create a new HTTP Endpoint using the free Request Inspector service. This will allow you to see how your requests are received on an API server.

Keep this open to see your requests later.

Enter your API URL:

Step 2: Open Burp Browser

Copy the URL below and open it inside a Burp proxy intercept browser to intercept requests in the next steps.

https://examples.insecure.chefsecure.com/examples/modify-requests

Step 3: Intercept and Modify a GET Request with Burp

Intercept and modify the GET request that gets sent when you click the button below.

Change the resource id in the query parameters that pass extra data to the URL – they look like:

?name1=value1&name2=value2

Step 4: View Your Request

Revisit your API endpoint page to analyze the request contents.

Step 5: Send and Modify a POST Request

Intercept and modify the POST request that gets sent when you click the button below.

Change the input value using Burp.

Step 6: Send and Modify Your Request Again Using Repeater

Within Burp Proxy, select the HTTP history tab then select the request you just made. Right-click, then select Send to Repeater then click on the highlighted Repeater tab.

Step 7: View Your Modified Requests

Revisit your API endpoint page to analyze your POST request.

Step 8: Intercept and Modify a JSON POST Request

JSON (JavaScript Object Notation) is often used by website developers to send and receive data. It looks like this:

{ "a": 1, "b": 2 }

Click the button below to intercept and modify a POST request containing JSON data.