After this chapter, we can use Proxy, Scanner, Target, Intruder, and Repeater. The important bit is to learn how to use these tools together. In a way, Burp Suite tools mimic how simple command-line utilities on a Unix/Linux command line can work together to fulfill complex tasks effectively. Similarly, Target, Proxy, Scanner, Intruder, and Repeater offer an infinite number of ways to interact and work with applications to test them for security.
Now, you should be aware of how and when to use which tool. The innate understanding on how they all fit comes from testing a variety of applications and facing challenges, which can be solved by combining the use of multiple tools together.
We are now prepared to talk more about the rest of the power tools in the Burp Suite arsenal.