![]() Use the Target analyzer to analyze how many static and dynamic URLs the target application contains, and how many parameters each URL takes.You can also use other Burp tools to help you analyze the attack surface and decide where to focus your attention: This tool enables you to store and annotate HTTP messages to organize your workflow. You can send HTTP messages that you want to investigate further to Burp Organizer. While you use these tools you can quickly view and edit interesting message features in the Inspector. Use the Proxy history and Target site map to analyze the information that Burp captures about the application. Session handling rules and macros to handle these situations. Many applications contain features that hinder testing, such as reactive session termination and use of pre-request tokens. Managing application logins using the configuration library.Submitting extensions to the BApp Store.Viewing requests sent by Burp extensions using Logger. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |