Summary

After this chapter, we can use Proxy, Scanner, Target, Intruder, and Repeater. The important bit is to learn how to use these tools together. In a way, Burp Suite tools mimic how simple command-line utilities on a Unix/Linux command line can work together to fulfill complex tasks effectively. Similarly, Target, Proxy, Scanner, Intruder, and Repeater offer an infinite number of ways to interact and work with applications to test them for security.

Now, you should be aware of how and when to use which tool. The innate understanding on how they all fit comes from testing a variety of applications and facing challenges, which can be solved by combining the use of multiple tools together.

We are now prepared to talk more about the rest of the ...

Get Burp Suite Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.