Summary

Now you know how to restrict the scope of HTTP traffic you would like to intercept. You saw how to include and exclude URL patterns for targets to configure, what in-scope is, and what out-of-scope is. Additionally, you learned how to configure Burp to be able to talk to other proxy servers if required and how to use the SOCKS proxy server, especially in a SSH tunnel kind of scenario.

You also learned how simple it is to create multiple listeners for Burp, which allows other devices in the network to send their HTTP traffic to the Burp interception proxy. The next chapter covers how to configure a proxy for SSL and other advanced settings that can be configured with Burp Suite.

Get Burp Suite Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.