![]() ![]() Managing application logins using the configuration library.Credential stuffing using Burp Intruder.Spoofing your IP address using Burp Proxy match and replace.Testing for reflected XSS using Burp Repeater.Viewing requests sent by Burp extensions using Logger. ![]() Brute forcing a login with Burp Intruder.Resending individual requests with Burp Repeater.Augmenting manual testing using Burp Scanner.Intercepting HTTP requests and responses.Viewing requests sent by Burp extensions.Identifying which parts of a token impact the response.Search Professional and Community Edition ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |