


#8 Before we move onto exploring our target definition, let’s take a look at some of the advanced customization we can utilize in the Burp proxy. #7 Defined in RFC 6455 as a low-latency communication protocol that doesn’t require HTTP encapsulation, what is the name of the second section of our saved history in Burp Suite? These are commonly used in collaborate application which require real-time updates (Google Docs is an excellent example here). What is the name of the first section wherein general web requests (GET/POST) are saved? HTTP history This can be especially useful when we need to have proof of our actions throughout a penetration test or we want to modify and resend a request we sent a while back. #6 Burp Suite saves the history of requests sent through the proxy along with their varying details. #5 How about if we wanted to forward our request to Intruder? CTRL-I Take a look at the actions, which shortcut allows us to forward the request to Repeater? CTRL-R Change back to Burp Suite, we now have a request that’s waiting in our intercept tab. Note that the page appears to be continuously loading. #4 Return to your web browser and navigate to the web application hosted on the VM we deployed just a bit ago. What is it? Use the format of IP:PORT 127.0.0.1:8080 #2 By default, the Burp Suite proxy listens on only one interface. #9 Last but certainly not least, which tool allows us to modify Burp Suite via the addition of extensions? Extender #8 With four modes, which tool in Burp can we use for a variety of purposes such as field fuzzing? Intruder #7 Simple in concept but powerful in execution, which tool allows us to reissue requests? Repeater #6 Which tool allows us to redirect our web traffic into Burp for further examination? Proxy #5 Encoding or decoding data can be particularly useful when examining URL parameters or protections on a form, which tool allows us to do just that? #4 While only available in the premium versions of Burp Suite, which tool can we use to automatically identify different vulnerabilities in the application we are examining? Scanner #3 Which tool can we use to set the scope of our project? Target
#BURP SUITE REPEATER SEND SHORTCUT PASSWORD#
#2 What tool could we use to analyze randomness in different pieces of data such as password reset tokens? Sequencer #1 Which tool in Burp Suite can we use to perform a ‘diff’ on responses and other pieces of data? Comparer
