Burp Suite includes multiple tools for working with opaque data that isn't human-readable. You can use these while you analyze the attack surface, in order to review the information being transmitted and better understand how the application works. For example, you may be able to see whether the opaque data contains any information such as a username or timestamp, or whether you can edit the opaque data to impact the response.
You can use the following tools to decode and work with opaque data in Burp Suite:
You can follow along with the processes below using the Modifying serialized data types lab.
You can use the Inspector to perform URL and Base64-decoding, and to modify decoded data as you work.
In Proxy > HTTP History, highlight the data that you want to study. Notice that the selected text is shown in the Inspector panel. If Burp recognizes an encoding format, it automatically decodes the data. The decoded text is also shown in the Inspector panel.
If the data is decoded in the Inspector panel, you can modify the decoded data in the panel to see how this impacts the response:
Click Apply changes. The edited data is re-encoded and updated in the request.
You can use Burp Decoder to apply a wider range of different decoding and encoding functions to opaque data.
Continue to apply decoding functions as required. In this example, URL-decoding is applied, then Base64-decoding.
Continue to apply encoding functions as required. In this example, the decoded data is edited, then Base-64-decoding and URL-decoding are applied.