Book Image

Burp Suite Essentials

By : Akash Mahajan
Book Image

Burp Suite Essentials

By: Akash Mahajan

Overview of this book

Table of Contents (19 chapters)
Burp Suite Essentials
Credits
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Index

Summary


After this chapter, we can use Proxy, Scanner, Target, Intruder, and Repeater. The important bit is to learn how to use these tools together. In a way, Burp Suite tools mimic how simple command-line utilities on a Unix/Linux command line can work together to fulfill complex tasks effectively. Similarly, Target, Proxy, Scanner, Intruder, and Repeater offer an infinite number of ways to interact and work with applications to test them for security.

Now, you should be aware of how and when to use which tool. The innate understanding on how they all fit comes from testing a variety of applications and facing challenges, which can be solved by combining the use of multiple tools together.

We are now prepared to talk more about the rest of the power tools in the Burp Suite arsenal.