How to Install Burp Suite on Linux

Image Displaying Burp Suite Logo Over A Coding Screen(2)(1)(1) 11zon

Web application security is crucial in today’s interconnected world. It has become increasingly important, as the number of cyber threats and vulnerabilities continues to rise. Burp Suite is a powerful tool to help you find and fix these security flaws. This tool is popular among developers, QA testers, and web security experts. This tutorial shows how to install Burp Suite on Linux.

What Is Burp Suite?

Burp Suite is a unified platform for penetrating and evaluating the security of web applications. It is a comprehensive suite of features that helps security analysts and white-hat hackers find and exploit deficiencies in web applications.

Common vulnerabilities like Cross-Site Scripting (XSS), SQL Injection, and Insecure Direct Object References (IDOR) can be uncovered through Burp Suite by analyzing and manipulating HTTP requests and answers. It functions effectively as a Mitmproxy, allowing you to intercept, analyze, and alter traffic in both directions.

Burp Suite is known for its plethora of tools, which include Proxy, Scanner, Intruder, Repeater, Sequencer, and Extender.

Before Installation

Updating your system is always recommended before you install any software, as it ensures that your system is updated with the latest security patches. Run the commands below to do so.

For Linux distributions based on Ubuntu and Debian:

sudo apt update && apt upgrade -y

Next, check your system’s Java version:

java -version

You are ready to download and install Burp Suite.

Downloading and Installing Burp Suite on Linux

  1. Go to the PortSwigger website and check the download section for the download link.
Burp Suite Installation Link Web Page
  1. The Burp Suite Community Edition is a free version and adequate to start finding bugs and application security. Select “Burp Suite Community Edition” from the drop-down list for Linux 64-Bit to begin the download.
  2. After the download is finished, launch a terminal. cd to the Download folder, then run the chmod command to make it executable.
cd ~/Downloads
chmod +x
  1. Run the script with administrative privileges:
sudo ./
  1. You will find the Burp Suite installer on-screen, just after the script runs. Click “Next” to proceed with the installation.
Burpsuite Installer Interface
  1. Open the app drawer and search for Burp Suite, then click to launch it.

Setting Up the Browser with Burp Suite

While Burp Suite is compatible with other web browsers, it will need additional browser configurations for it to do its work better.

Note: we are using Mozilla Firefox as the primary browser for this example.

To start, we need to install the FoxyProxy Standard extension, a tool that allows users to configure their browser to use a proxy server. Burp Suite uses this tool to intercept and modify the traffic between the browser and the server.

Burp Suite Foxy Proxy Browser Extension Web Page

With the extension installed:

  1. Click the FoxyProxy icon in the plugins menu and select “Options” from the drop-down list to access the FoxyProxy options.
  2. Click the “Add New Proxy” button to create a new proxy configuration.
  3. Enter any name for the new proxy configuration in the “Proxy Details” tab.
  4. In the “Proxy IP Address” field, specify the IP address as and the port number as 8080, the defaults.
Foxy Proxy Web Application Page with Configuration
  1. Click the “Save” button to save the updated proxy configuration.
  2. Click on the FoxyProxy icon in the toolbar to activate it.

The browser can now send and receive traffic via the Burp Suite application.

Setting Up the Security Certificate

Follow the steps below to set up the security certificate.

  1. Launch a browser and open
  2. Select “CA Certificate” on the top right and save the file.
  3. Head to the browser’s Settings and navigate to the “Privacy and Security” tab.
  4. Find the “Certificates Section,” click “View the Certificate,” and select “Import.”
  5. Select the certificate in the pop-up window and click the “OK” button.

Now we are ready to test Burp Suite.

To test the Burp Suite application, open it, then click the “Intercept” button under the proxy tab and turn it on. You will be able to see the incoming traffic.

Running Burp Suite

  1. Once you open the Burp Suite application, it will ask which project to start with: either a temporary project or existing open project.
Burpsuite New Project Page
  1. After the project type is selected, press “Next,” check the “Use Burp defaults” option, then click “Start Burp.”
Burp Suite Start Page
  1. The Burp Suite Community Edition will start the project. You will find the list of tools required for testing applications at the top of the page in a line.
Burp Suite Main Interface 1
  1. You need to fix the proxy settings first, then press the “Intercept On” button. Once you open the browser, the Burp Suite Proxy feature will come into play. You will be able to see the traffic activity and data packet details of the current network.
Burp Suite Proxy Intercept On

Now you are ready to test your new application on Burp Suite. Do also check out more open-source security tools for Linux.

Uninstallation of Burp Suite

While installing and configuring Burp Suite is quite a hefty task, uninstallation is the opposite.

  1. Move to the app directory and find the script “”
  2. Make it executable:
chmod +x
  1. Run the script:
  1. The Burp Suite uninstaller will appear. Follow the on-screen instructions to uninstall the Burp Suite application from your Linux system.
Burpsuite Uninstaller Interface

Frequently Asked Questions

Is the Burp Suite Community Edition appropriate for commercial use?

Yes. It is entirely free to use and doesn’t require any licensing costs. The Professional Edition of Burp Suite is also available, providing enhanced features and customization options.

What are the limitations of Burp Suite Community Edition?

While the Burp Suite Community Edition provides essential security testing tools, it has several drawbacks compared to the Professional Edition. Some of these restrictions include restricted scanner tool functionality, limited reporting choices, and fewer options for customization.

Image credit: Pexels. Alterations and screenshots by Surajit Saha.

Surajit Saha

Technical nerd by trade. Enjoys smart devices and smartphones. Shares a tremendous love for Cricket and Music.

Subscribe to our newsletter!

Our latest tutorials delivered straight to your inbox