Information Security 12 min read

Using Burp Suite for Penetration Testing of the ZhiXin Mobile Application

This article explains how to employ Burp Suite to conduct comprehensive penetration testing on the ZhiXin mobile app, covering setup, proxy configuration, detection of sensitive data leaks, privilege escalation, XSS, and SQL injection vulnerabilities, and provides remediation recommendations.

Zhengtong Technical Team
Zhengtong Technical Team
Zhengtong Technical Team
Using Burp Suite for Penetration Testing of the ZhiXin Mobile Application

1. Background

As the ZhiXin app expands, information security and defensive measures have become a focal point for mobile applications. Apps built primarily on WebView use HTTP or HTTPS requests, which may expose security risks such as system vulnerabilities leading to user data leakage; therefore, security testing is a reliable method to protect user information.

Burp Suite is a mainstream penetration testing tool that combines the advantages of Fiddler and Charles, works cross‑platform, and integrates various scanning plugins that can be used individually or together, making it an ideal choice for security testing. This article introduces the specific application of Burp Suite in the ZhiXin app.

2. Penetration Testing

2.1 What is Penetration Testing

Penetration testing involves, with user authorization, simulating hacker attacks on a system to discover hidden risks.

2.2 Why Perform Penetration Testing

Penetration testing uses technical methods to verify a target system's security, identifying hidden vulnerabilities to achieve proactive defense.

The goal is to discover and resolve issues before they affect user safety.

3. What is Burp Suite

Burp Suite is an integrated platform for attacking web and mobile applications, primarily used for security penetration testing. It provides request interception, Burp Spider crawling, vulnerability scanning, brute‑force login cracking, and session token randomness checks.

3.1 Using Burp Suite for Traffic Capture

The ZhiXin client uses Burp Suite for penetration testing, mainly to capture and analyze intercepted request information.

Environment: a Windows PC with Burp Suite v1.6.17 installed and an Android phone.

(1) Connect the Android client and PC to the same Wi‑Fi subnet.

(2) Open Burp Suite and configure Proxy Listener (Proxy → Options → Proxy Listeners).

Click the "Add" button to set a new proxy listener with the PC's IP address and a custom port (e.g., 8080).

(3) Configure the phone's proxy: in Wi‑Fi settings, set the proxy to manual and input the "Proxy host name" and "Proxy port" matching the listener created in Burp Suite.

(4) To capture HTTPS traffic, install the Xposed + JustTrustMe module on the phone and restart. On the PC, use Chrome or Firefox to access the proxy IP and port, download the Burp Suite certificate, and trust this CA certificate on the phone.

3.2 Burp Suite Testing Process

This article uses Burp's proxy to capture application‑related information and analyze vulnerabilities in the ZhiXin client.

The main approach is to obtain application links, forms, and other requests via the proxy, then scan and attack them with Burp Suite for vulnerability detection.

4. Penetration Test Findings and Remediation

The testing focuses on sensitive information leakage, privilege escalation, XSS, and SQL injection vulnerabilities.

4.1 Sensitive Information Detection

4.1.1 Common Sensitive Data

Typical sensitive data includes plaintext transmission of usernames, passwords, verification codes, ID numbers, etc.

4.1.2 Detection Process

Check whether API responses or parameters directly expose user‑sensitive information.

Verify whether server logs store or print sensitive data.

4.1.3 Remediation

Encrypt any returned or displayed sensitive information such as phone numbers or email addresses.

Prevent server logs from printing or storing sensitive data. For example, the login API already encrypts passwords, indicating no leakage.

4.2 Privilege Escalation Vulnerability

4.2.1 Introduction

Privilege escalation allows one account to control all user data, often caused by missing permission checks during CRUD operations.

4.2.2 Test Process

Modify ID‑type parameters in request URLs.

4.2.3 Remediation

Permission verification should ensure that altering user‑identity parameters does not grant unauthorized access.

Using user A, attempts to modify request parameters should not retrieve user B's data.

Ordinary users should be unable to access or modify admin‑level interfaces; test results showed no data returned for altered case IDs, indicating no privilege escalation.

4.3 Cross‑Site Scripting (XSS) Vulnerability

4.3.1 Introduction

XSS attacks inject malicious scripts into webpages; when users view the page, the script executes, achieving the attacker’s goals.

4.3.2 Test Process

Enter JavaScript code in any input field: <script>alert(123)</script> .

4.3.3 Remediation

Filter user‑provided content so that injected JS is not executed when displayed.

Avoid loading untrusted external resources such as JS, CSS, or iframes.

When the JS code was entered in the issue‑report description box, the history view displayed the code without execution, confirming no XSS vulnerability.

(Input JS code block)

(The JS code was not executed, no XSS vulnerability)

4.4 SQL Injection Vulnerability

4.4.1 Introduction

SQL injection attacks insert malicious SQL commands into data inputs, allowing attackers to query, modify, or manage the database.

4.4.2 Test Process

Determine possible injection points by:

For numeric parameters (e.g., id), test id=2-1 versus id=1; identical results suggest numeric injection.

Append single or double quotes, or logical operators (e.g., id=1' OR 'a'='a') and observe error messages or result changes.

4.4.3 Remediation

Avoid executing raw SQL from parameters; use parameterized queries or escape/validate external inputs.

Manual injection attempts on parameters such as recTypeID showed no errors or altered results, indicating the absence of SQL injection.

5. Conclusion

Security testing is a crucial component of a software security framework. Using Burp Suite to perform penetration testing on ZhiXin can significantly prevent production‑environment vulnerabilities, thereby ensuring product safety, robustness, and stability.

Future work will compare other security testing tools to efficiently uncover hidden risks and continuously provide users with a secure, high‑quality experience.

information securityMobile SecurityApp Testingpenetration testingBurp Suite
Zhengtong Technical Team
Written by

Zhengtong Technical Team

How do 700+ nationwide projects deliver quality service? What inspiring stories lie behind dozens of product lines? Where is the efficient solution for tens of thousands of customer needs each year? This is Zhengtong Digital's technical practice sharing—a bridge connecting engineers and customers!

0 followers
Reader feedback

How this landed with the community

login Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.