• Skip to main content
  • Skip to primary sidebar

Technipages

Smart phone, gadget and computer tutorials

  • Topics
    • Android
    • Gaming
    • Hardware
    • Internet
    • iOS
    • MacOS
    • Office
    • Software
    • Windows
    • Definitions
  • Product Reviews
  • Downloads
  • About
How to Filter the HTTP History in Burp Suite

How to Filter the HTTP History in Burp Suite

Posted on November 11, 2020 by Mel Hawthorne Leave a Comment

As a web proxy intended for use as part a penetration test of websites, Burp Suite allows you to intercept and modify your web traffic on the fly. Alternatively, you can use historical requests that you’ve proxied and then replay them or edit them before sending them to the webserver, in an attempt to identify vulnerabilities.

One way to go through your web traffic is to use the Site map in the “Site map” sub-tab of the “Target” tab. This allows you to see your entire request history in a tree based on the websites and webpages that you’ve visited. The other method is to use the HTTP history, which can be found in the “HTTP History” sub-tab of the “Proxy” tab.

The HTTP history contains a list of all of the requests that you’ve made and the responses they’ve received. By default, the HTTP history hides images, CSS, and general binary files that you’ve requested, by using the filter. You can configure the filter by clicking on the “Filter” bar just below the sub-tab bar.

You can find the filter just under the sub-tab bar.

What types of filters can you apply?

You can configure the filter to filter results based on the type of request such as if the requested resource is within the scope. You can filter by the MIME type of the requested file, such as HTML. You can filter by HTTP status code classes, such as 2xx codes which represent successes.

You can configure specific file extensions that you both want to see and want to hide. You can add comments and annotations to specific requests and then filter by those; a feature that can be helpful if you’re using that to keep track of which specific request contains your proof of concept exploit, or which request you need to look at further. If you’re running multiple proxy listeners, you can filter requests by which port number the request came in to.

If you’re using a “Professional” Burp licence you can also search by custom search terms using regex. At the bottom of the filter customisation panel are three buttons allowing you to show and hide all content, and to revert the filter to its default setting.

The filter offers many ways to specify which files you do and don’t want to see.

In most cases, the default filter is perfectly good to use. If you use the scoping feature though the “Show only in-scope items” filter can be particularly helpful in filtering out other requests.

You Might Also Like

  • What Is Burp Suite?
    What Is Burp Suite?
  • How to Use Burp Suite Repeater
    How to Use Burp Suite Repeater
  • How to Use Burp Suite Decoder
    How to Use Burp Suite Decoder
  • How to Set up a Proxy Listener in Burp Suite
    How to Set up a Proxy Listener in Burp Suite
  • How Does Burp Suite’s Intercept Function Work?
    How Does Burp Suite’s Intercept Function Work?
  • How to Add Websites to Burp Suite’s Target Scope
    How to Add Websites to Burp Suite’s Target Scope
  • How to Import Burp Suite’s HTTPS Certificate in Windows
    How to Import Burp Suite’s HTTPS Certificate in Windows
  • How to Automatically Replace Data in a Web Response With Burp Suite
    How to Automatically Replace Data in a Web Response…
  • How to Configure Burp Suite to Intercept Network Traffic
    How to Configure Burp Suite to Intercept Network Traffic

Filed Under: Software

Reader Interactions

Did this help? Let us know! Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

Recent Posts

  • Fix Skype Error: Exchange Needs Your Credentials
  • Fix Skype Notifications Not Working on Windows 10
  • Teams in Outlook: We Couldn’t Schedule the Meeting
  • VR Oculus Quest 2: How to Configure a New Room-Scale Boundary
  • VR Oculus Quest 2: How to Adjust Boundary Sensitivity
  • Dropbox: How To Change the Date Format
  • Microsoft Teams: There Was a Problem Saving the Photo
  • VR Oculus Quest 2: How to Set up Oculus Link

Who’s Behind Technipages?

Baby and Daddy My name is Mitch Bartlett. I've been working in technology for over 20 years in a wide range of tech jobs from Tech Support to Software Testing. I started this site as a technical guide for myself and it has grown into what I hope is a useful reference for all.

Follow me on Twitter, or visit my personal blog.

You May Also Like

  • HTTP
  • S-HTTP

© Copyright 2021 Technipages · All Rights Reserved · Privacy