The central site map aggregates all of the information that Burp has gathered about applications.

You can filter and annotate this information to help manage it, and also use the site map to drive your testing workflow.

Target Information
The site map displays target information in tree and table form, and also lets you view full requests and responses for individual items where available. The tree view contains a hierarchical representation of content, with URLs broken down into domains, directories, files, and parameterized requests. You can expand interesting branches to see further detail. If you select one or more parts of the tree, all the selected items and items in child branches are shown in the table view. The table view shows key details about each item (URL, HTTP status code, page title, etc.). You can sort the table according to any column (click the column header to cycle through ascending sort, descending sort, and unsorted). If you select an item in the table, the request and response (where available) for that item are shown in the request/response pane. This contains an HTTP message editor for the request and response, providing detailed analysis of each message. The site map aggregates all of the information that Burp has gathered about applications. This includes:
   

All of the resources that have been directly requested via the Proxy. Any items that have been inferred by analyzing the responses to proxy requests (provided you have not disabled passive spidering). Content discovered using the Spider or content discovery functions. Any items manually added by the user, from the output of other tools.

Items in the site map that have been requested are shown in black. Items that have not yet been requested are shown in gray. By default (with passive spidering enabled) when you begin browsing a typical application, a large amount of content will appear in gray before you even get as far as requesting it, because Burp has discovered links to it in the content that you have requested. You can remove uninteresting content (for example, on other domains that are linked to from your target application), by setting an appropriate target scope and using the site map display filter.

Display Filter
The site map has a display filter that can be used to hide some of its content from view, to make it easier to analyze and work on the content you are interested in. The filter bar above the site map describes the current display filter. Clicking the filter bar opens the filter options for editing. The filter can be configured based on the following attributes:

Request type - You can show only in-scope items, only requested items, only requests with parameters, or you can hide not-found items.

Folders . only hidden. to add or edit a comment in-place. Annotation . You can configure whether the search term is a literal string or a regular expression.      MIME type .You can configure whether to show or hide responses with various HTTP status codes. If you select the "Negative search" option. and the display filter controls what is included in that view. these are not deleted. This is useful to remove folders whose child items have all been hidden by other display filter attributes. File extension . You can comment one or more selected items using the "Add comment" item on the context menu. CSS. you can annotate items by adding comments and highlights. When you have annotated interesting requests. You can highlight one or more selected items using the "Highlight" item on the context menu. Status code . then only items not matching the search term will be shown. This can be useful to describe the purpose of different URLs. Annotations In the table view. This means you can use the filter to help you systematically examine a complex site map to understand where different kinds of interesting content reside. You can add highlights in two ways:   You can highlight individual items using the drop-down menu on the left-most table column. You can add comments in two ways:   You can double-click the relevant entry. such as HTML.You can optionally hide empty folders in the tree view. Testing Workflow As well as displaying all of the information gathered about your target. If you set a filter to hide some items.You can configure whether to show only items with user-supplied comments or highlights. or images. The content displayed within the site map is effectively a view into an underlying database. and to flag up interesting items for further investigation. using the context menus that .You can configure whether to show or hide items with specified file extensions. and whether it is case sensitive. you can use column sorting and the display filter to quickly find these items later.[Pro version] You can filter on whether or not responses contain a specified search term.You can configure whether to show or hide responses containing various different MIME types. the site map enables you to control and initiate specific attacks against the target. and will reappear if you unset the relevant filter. Search term . within the Comment column.

appear everywhere. Hence.[Pro version] You can use the Find references function to search all of Burp's tools for HTTP responses that link to the selected item. The following sub-options are available: o In original session . Engagement tools .You can use this to render the selected response in your browser. The ability to send requests between tools forms the core of Burp's user-driven workflow. relative links within the response will be handled properly by your browser.these will be handled by Burp in the usual way. to perform further attacks or analysis. and send the request to other Burp tools. Request in browser . this methodology. and the type of item(s) selected. The exact options that are available depend on the location where the context menu was invoked. As a result. multi-stage processes. you can select a host or folder within the tree view. Burp gives you a unique URL that you can paste into your browser (configured to use the current instance of Burp as its proxy).These options create new target scope rules which add or remove the selected item(s) from scope. . Scan / Spider / Send to . is normally a lot easier than repeating a multi-stage process over and over. etc. by selecting requests within Burp that were generated within one user context (e. A common technique when testing an application that includes some sensitive URLs is to add the whole application path (domain or directory) to the target scope.[Pro version] You can use the Search function to search the selected branch(es) of the site map for items matching a specific expression. You can use this feature to facilitate testing of access controls.. such as Intruder or Repeater. to avoid the limitations of Burp's built-in HTML renderer. When you are dealing with complex. . and yet the response is processed by the browser in the context of the originally requested URL. o Find comments / scripts . The rule generated will apply to the selected item and all child branches in the tree..) in the course of rendering the response . The resulting browser request is served by Burp with the exact response that you selected (the request is not forwarded to the original web server). Or you can select an individual item anywhere. The complete list of context menu actions is as follows:      Add to / remove from scope . o Find references . of manually pasting a series of URLs from Burp into your browser.[Pro version] This submenu contains various useful functions for carrying out engagement-related tasks: o Search . an ordinary user). and modifying cookies manually using the Proxy. For example.You can use this to re-issue the selected request in your browser (configured to use the current instance of Burp as its proxy). and then select the sensitive items and exclude them from scope. and perform actions on the entire branch of the tree.g. o In current browser session . and reissuing the requests within a different user context that you are now logged in as (e. CSS.g. Show response in browser .This causes Burp to issue the request using the exact Cookie header that appeared in the original request. to render the response.This causes Burp to issue the request using the cookies supplied by your browser. When you select this option.You can send any item to other Burp tools. an administrator). such as spidering or scanning.[Pro version] You can use the Find comments / scripts functions to search the selected branch(es) of the site map for comments and scripts. your browser may make additional requests (for images.

Expand / collapse branch / requested items . Delete item(s) . o Discover content . Save item(s) . Highlight . HTTP status code and MIME type. Add comment .You can use this function to add a comment to the selected table item(s). and copies these to the clipboard. will cause the selected request to be issued.You can use the Compare site maps function to identify differences between two site maps. See Annotations for more details. and how many parameters each URL takes.[Pro version] You can use the Discover content function to discover content and functionality that is not linked from visible content which you can browse to or spider. This is a powerful feature that can be used for various purposes. when viewed in a browser.This function parses the selected item(s) for links. o Generate CSRF PoC . or by manually removing irrelevant branches of the tree.You can use these functions in the tree view to quickly expand whole branches of the tree.This function lets you specify a file to save the details of selected item(s) in XML format. Since by default the site map displays all content that Burp has identified based on HTTP responses.This function copies the URL(s) of the selected item(s) to the clipboard. o . in particular testing for access control vulnerabilities. and all relevant metadata such as response length.You can use this function to apply a highlight to the selected table item(s). You can deal with this either by configuring a suitable target scope and a display filter. and collapse them after you have reviewed them.        Analyze target .[Pro version] You can use the Target Analyzer function to analyze the selected branch(es) of the site map and tell you how many static and dynamic URLs it contains. o Simulate manual testing . Copy URL(s) . Copy links . including full requests and responses. the map will often include a large amount of third-party content that is linked to from the application you are interested in.[Pro version] You can use the Schedule task function to create tasks that will run automatically at defined times and intervals.[Pro version] You can use the Generate CSRF PoC function to create some HTML which.[Pro version] The Manual testing simulator can be used to generate HTTP traffic that is similar to that caused by manual penetration testing. o Schedule task . See Annotations for more details. Compare site maps .This function removes the selected item(s) permanently.

Sign up to vote on this title
UsefulNot useful